| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| DOGS / WETH 1% | uniswap_v3 | 0xd980...98a0 | 0.000000007856892203 |
| DOGS / CAW 0.3% | uniswap-v4-ethereum | 0xa0e5...033d | 0.000000007723605651 |
| DOGS / CAW 1% | uniswap_v3 | 0xf4a1...413b | 0.000000007376249722 |
| DOGS / CAW 0.01% | uniswap_v3 | 0x2792...04d5 | 0.000000007621035893 |
| DOGS / SHI 1% | uniswap-v4-ethereum | 0x78cb...37c2 | 0.00000001427337654 |
| DOGS / TREAT 1% | uniswap_v3 | 0x6198...ca9d | 0.00000000704038951 |
| DOGS / ETH 1% | uniswap-v4-ethereum | 0x7bf4...3a54 | 0.000000007608533246 |
| DOGS / WETH 0.3% | uniswap_v3 | 0x7354...7818 | 0.00000000755848723 |
| SHIZ / DOGS 1% | uniswap-v4-ethereum | 0x5d55...3ad6 | 0.0000000185609906 |
| DOGS / TREAT 1% | uniswap-v4-ethereum | 0xe847...96ac | 0.000000006480723594 |
| SHIZ / DOGS 1% | uniswap_v3 | 0x6e7a...4b9a | 0.00000001261307244 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.