| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| OL / USDT 1% | uniswap_v3 | 0xa435...8192 | 0.2018397168 |
| OL / ETH 1% | uniswap-v4-ethereum | 0xf8c9...35d3 | 0.07813107256 |
| OL / USDC 1% | uniswap-v4-ethereum | 0x4eea...f0f5 | 0.01314888247 |
| OL / USDT 1% | uniswap-v4-ethereum | 0x56c2...05f0 | 0.08551122761 |
| OL / USDT 70% | uniswap-v4-ethereum | 0x2ea9...e710 | 0.06889945345 |
| OL / ETH 90% | uniswap-v4-ethereum | 0x4d9a...636e | 0.007202844257 |
| OL / USDC | bunni-ethereum | 0x4a53...9e23 | 0.05442786556 |
| OL / WETH 1% | uniswap_v3 | 0x181a...35a3 | 0.3346384068 |
| OL / BIGTIME 1% | uniswap-v4-ethereum | 0x603e...1a6f | 0.01325802876 |
| OL / USDC 0.3% | uniswap_v3 | 0x3fa0...45ce | 0.06003153086 |
| OL / USDC 1% | uniswap_v3 | 0x1ebf...0b89 | 0.01733683244 |
| OL / WETH | pancakeswap_ethereum | 0x45f9...1a9c | 131.3683579351 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.