| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| BID / WETH | uniswap_v2 | 0x0f97...426c | 0.000155536496643421 |
| BID / USDT | uniswap_v2 | 0xfcd3...4696 | 0.000153517903849685 |
| BID / UNI | uniswap_v2 | 0x49ef...c227 | 0.000143106101225286 |
| BID / WETH 1% | uniswap_v3 | 0x35c3...0c86 | 0.00316582820071059 |
| BID / LINK | uniswap_v2 | 0x6846...d3ce | 0.0001607730302 |
| XSP / BID | uniswap_v2 | 0x3c3b...a7c7 | 0.0001567423156 |
| BID / AXN | uniswap_v2 | 0x57e6...d84a | 0.0002739915368 |
| GALAXY / BID | uniswap_v2 | 0x72b3...d1a0 | 0.0001556078479 |
| BID / BID | uniswap_v2 | 0x5b4a...1e5e | 0.0002209623054 |
| BID / CYTR | uniswap_v2 | 0x7e36...7abd | 0.000321212139 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.