| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| LEASH / WETH | uniswap_v2 | 0x8743...60ee | 0.00000007910462633 |
| LEASH / WETH | shibaswap | 0x5765...fb53 | 0.00000007838547258 |
| LEASH / USDT 8% | uniswap-v4-ethereum | 0xd456...675f | 0.00000007659312597 |
| LEASH / SHIB | shibaswap | 0x351c...7a8f | 0.00000007823042262 |
| LEASH / BONE | shibaswap | 0xf6ba...d1a7 | 0.00000007823042262 |
| LEASH / xFUND | shibaswap | 0xfe8f...6e31 | 0.00000007599395505 |
| LEASH / WETH 1% | uniswap_v3 | 0xc246...2060 | 0.00002674589556 |
| LEASH / SHIB 1% | uniswap_v3 | 0xb0a1...753f | 60.2979094831 |
| LEASH / ETH 1% | uniswap-v4-ethereum | 0x1ca7...0016 | 0.0000006132408108 |
| LEASH / TREAT 0.3% | uniswap-v4-ethereum | 0x46ab...7c71 | 67.4385961429 |
| LEASH / USDC 93.1% | uniswap-v4-ethereum | 0x181b...0c9a | 0.0000002010435656 |
| LEASH / WETH 0.3% | uniswap_v3 | 0x3bc8...f717 | 318.619584974687 |
| LEASH / USDC 73.5% | uniswap-v4-ethereum | 0x52a4...c970 | 0.000001297481693 |
| LEASH / SAS | uniswap_v2 | 0x42e0...09ce | 0.0000001338672545 |
| LEASH / ETH 0.5% | uniswap-v4-ethereum | 0xdcb6...3f89 | 0.0000009377169951 |
| LEASH / ccBCH | shibaswap | 0xfc27...d150 | 0.0000002537274266 |
| LEASH / WBTC | shibaswap | 0xbcab...aa05 | 0.000005444061477 |
| LEASH / SAITAMA | shibaswap | 0x84a1...7278 | 0.0000461950601 |
| LEASH / USDT 1% | uniswap_v3 | 0xd719...bc84 | 643.670790039802539948139406625 |
| LEASH / USDT | uniswap_v2 | 0x7e09...8cca | 0.0001862132853 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.