| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| DOGS / WETH 1% | uniswap_v3 | 0xd980...98a0 | 0.00000000996292335482647 |
| DOGS / CAW 1% | uniswap_v3 | 0xf4a1...413b | 0.00000000941256544125189 |
| DOGS / ETH 1% | uniswap-v4-ethereum | 0x7bf4...3a54 | 0.00000000992736323391182 |
| DOGS / CAW 0.01% | uniswap_v3 | 0x2792...04d5 | 0.0000000111547450029665 |
| DOGS / SHI 1% | uniswap-v4-ethereum | 0x78cb...37c2 | 0.00000001427337654 |
| DOGS / TREAT 1% | uniswap_v3 | 0x6198...ca9d | 0.0000000109384108874775 |
| DOGS / WETH 0.3% | uniswap_v3 | 0x7354...7818 | 0.00000001055333225 |
| DOGS / CAW 0.3% | uniswap-v4-ethereum | 0xa0e5...033d | 0.0000000100391154140202 |
| SHIZ / DOGS 1% | uniswap-v4-ethereum | 0x5d55...3ad6 | 0.0000000185609906 |
| DOGS / TREAT 1% | uniswap-v4-ethereum | 0xe847...96ac | 0.0000000065496458017502 |
| SHIZ / DOGS 1% | uniswap_v3 | 0x6e7a...4b9a | 0.00000001261307244 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.