| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| TOWER / WETH | uniswap_v2 | 0x4e9e...8178 | 0.000212233021 |
| TOWER / CTA 0.3% | uniswap_v3 | 0x0c5b...56d9 | 0.0002089415687 |
| TOWER / USDC | sushiswap | 0xb473...33d5 | 0.0002109476678 |
| BONDLY / TOWER | sushiswap | 0x90e4...da51 | 0.000212952093382969 |
| TOWER / DOSE | uniswap_v2 | 0x2954...b765 | 0.0002127909567 |
| TOWER / WETH 0.05% | uniswap_v3 | 0x74c6...5f9f | 0.00435646420565298 |
| TOWER / USDT 0.05% | uniswap_v3 | 0x0a8e...2004 | 0.001982567051 |
| REVV / TOWER | uniswap_v2 | 0xfe74...483b | 0.000216212471700376 |
| TOWER / GMEE 0.3% | uniswap_v3 | 0x93db...9413 | 0.0002710484294 |
| TOWER / PROS 0.05% | uniswap_v3 | 0xceee...2106 | 0.0003289924196 |
| TOWER / MYTH | uniswap_v2 | 0x3e1f...ca9c | 0.0002146531915 |
| REVV / TOWER | sushiswap | 0x6f81...d543 | 0.0002303336427 |
| TOWER / WETH | sushiswap | 0xdbaa...9fa9 | 0.0002257425131 |
| PROS / TOWER | sushiswap | 0x0bfc...49d1 | 0.000221937599215331 |
| TOWER / USDC 88% | uniswap-v4-ethereum | 0x735e...b18a | 0.001826579083 |
| TOWER / WETH 0.3% | uniswap_v3 | 0xe3a4...da95 | 0.0079293665535565 |
| GMEE / TOWER | sushiswap | 0x4580...17cd | 0.00022487303554668 |
| SUPER / TOWER | uniswap_v2 | 0xb8a5...c3b8 | 0.0002518471116 |
| TOWER / BENJI | sushiswap | 0x6ad4...d171 | 0.0002256139129 |
| TOWER / ASTRAFER | sushiswap | 0xe9ed...4374 | 0.0002219209709 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.