| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| KEKIUS / WETH | uniswap_v2 | 0xfff8...9c74 | 0.00930368669083326 |
| KEKIUS / WETH 1% | uniswap_v3 | 0xa254...3e57 | 0.00927367261508162 |
| KEKIUS / KEK | uniswap_v2 | 0x5caf...0005 | 0.0100008844691354 |
| KEKIUS / KEK 0.01% | uniswap_v3 | 0xa892...2e11 | 0.0101220142900349 |
| KEKIUS / PEPE 1.5% | uniswap-v4-ethereum | 0xd608...c545 | 0.02091754546 |
| KEKIUS / ETH 1% | uniswap-v4-ethereum | 0x1dc3...82eb | 0.0098681148645174 |
| KEKIUS / ETH 40% | uniswap-v4-ethereum | 0xc183...e676 | 0.009825396365 |
| KEKIUS / TrumpBucks 1% | uniswap-v4-ethereum | 0xade2...47c2 | 0.00957758436667026 |
| KEKIUS / PEPE 1% | uniswap-v4-ethereum | 0x0676...3512 | 0.03079214263 |
| KEKIUS / BOYS 1% | uniswap-v4-ethereum | 0xf892...8826 | 0.02150215531 |
| KEKIUS / Gamer 0.3% | uniswap_v3 | 0x230b...a15b | 0.00974580512534457 |
| KEKIUS / KEK 0.3% | uniswap_v3 | 0xf96c...bd8c | 0.00953222879164238 |
| KEKIUS / SLACK 1% | uniswap-v4-ethereum | 0x80e9...7e24 | 0.03225115543 |
| ETH / KEKIUS 0.3% | uniswap-v4-ethereum | 0xefb7...9abe | 0.03874811294 |
| KEKIUS / WETH 0.3% | sushiswap-v3-ethereum | 0x4ac6...7e9e | 0.02592353155 |
| KEKIUS / WETH 0.05% | sushiswap-v3-ethereum | 0x90e0...0d9b | 0.02715079149 |
| KEKIUS / KEK 0.3% | sushiswap-v3-ethereum | 0x8fcc...6c45 | 0.02231433494 |
| KEKIUS / SLACK | uniswap_v2 | 0xf4af...4c8c | 0.02400867061 |
| KEKIUS / BITCOIN 1% | uniswap_v3 | 0x7171...4902 | 0.02222548886 |
| KEKIUS / USDC | uniswap_v2 | 0x7484...442a | 0.01075854177 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.