| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| AST / ETH 1% | uniswap-v4-ethereum | 0x438e...301c | 0.0158539111800719 |
| AST / WETH | uniswap_v2 | 0xca9c...a8e5 | 0.0159097396570041 |
| AST / WETH 0.3% | uniswap_v3 | 0x1174...53f0 | 0.05891358667 |
| AST / WETH 0.56% | balancer_ethereum | 0x7eb8...aca8 | 0.01706442509 |
| AST / USDC 0.3% | uniswap-v4-ethereum | 0x30d8...57fb | 0.0160793013778388 |
| AST / USDT 88% | uniswap-v4-ethereum | 0xb4fc...2ee3 | 0.004209770433 |
| AST / PYRENEES | uniswap_v2 | 0xf5f7...bb59 | 0.01625290314 |
| AST / USDC | sushiswap | 0xd3a1...c131 | 0.04192586074 |
| AST / KABOSU | uniswap_v2 | 0xe366...2c27 | 0.04147489872 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.