| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ASTRA / ETH 80.01% | uniswap-v4-ethereum | 0x4aae...a4b3 | 0.00009235672017 |
| ASTRA / USDT 79% | uniswap-v4-ethereum | 0x6217...45e8 | 0.00009989963672 |
| ASTRA / USDT 60% | uniswap-v4-ethereum | 0x910d...2507 | 0.00005132425273 |
| ASTRA / USDT 91% | uniswap-v4-ethereum | 0xc86f...8c0e | 0.03847058182 |
| ASTRA / USDT 90% | uniswap-v4-ethereum | 0x4a76...3cc8 | 0.00523748722 |
| ASTRA / USDC 99.95% | uniswap-v4-ethereum | 0x2f5c...0edf | 0.0003965206436 |
| ASTRA / USDC 85.6% | uniswap-v4-ethereum | 0x4f1e...6a5b | 0.0003090089157 |
| ASTRA / ETH 99.21% | uniswap-v4-ethereum | 0x3a33...5e21 | 0.00006500033745 |
| ASTRA / ETH 90% | uniswap-v4-ethereum | 0x69fb...bc26 | 0.00003477690027 |
| ASTRA / USDC 91% | uniswap-v4-ethereum | 0xd812...f09e | 0.0003140833593 |
| ASTRA / USDC 99.18% | uniswap-v4-ethereum | 0x2230...5925 | 0.00004261385274 |
| ASTRA / USDT 89.999% | uniswap-v4-ethereum | 0xe2eb...9b19 | 0.00005214231463 |
| ASTRA / USDC 70% | uniswap-v4-ethereum | 0x48e7...d7cf | 0.00008010072189 |
| ASTRA / USDT 89.997% | uniswap-v4-ethereum | 0x80f2...cd92 | 0.00001058565112 |
| ASTRA / USDC 97% | uniswap-v4-ethereum | 0x19db...c33b | 0.00004617409864 |
| ASTRA / ETH 80% | uniswap-v4-ethereum | 0x6537...d6fa | 0.0004879928869 |
| ASTRA / USDC 97.13% | uniswap-v4-ethereum | 0x8890...5367 | 0.00004741496338 |
| ASTRA / ETH 50% | uniswap-v4-ethereum | 0x56cf...f201 | 0.0008550422269 |
| ASTRA / USDT 89.998% | uniswap-v4-ethereum | 0x1931...9691 | 0.00001786391073 |
| ASTRA / USDC 99.995% | uniswap-v4-ethereum | 0x7c3e...ddb3 | 0.0003094191394 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.