| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| LEASH / WETH | uniswap_v2 | 0x8743...60ee | 0.0000105010633272961 |
| LEASH / WETH | shibaswap | 0x5765...fb53 | 0.0000107349994849253 |
| LEASH / SHIB | shibaswap | 0x351c...7a8f | 0.0000107468539065769 |
| LEASH / BONE | shibaswap | 0xf6ba...d1a7 | 0.0000103505034641658 |
| LEASH / xFUND | shibaswap | 0xfe8f...6e31 | 0.0000109157855342551 |
| LEASH / WETH 1% | uniswap_v3 | 0xc246...2060 | 0.00002674589556 |
| LEASH / SHIB 1% | uniswap_v3 | 0xb0a1...753f | 60.2979094831 |
| LEASH / USDT 8% | uniswap-v4-ethereum | 0xd456...675f | 0.006873621617 |
| LEASH / ETH 1% | uniswap-v4-ethereum | 0x1ca7...0016 | 0.0000184660583814249 |
| LEASH / TREAT 0.3% | uniswap-v4-ethereum | 0x46ab...7c71 | 67.4385961429 |
| LEASH / ccBCH | shibaswap | 0xfc27...d150 | 0.00001698427892 |
| LEASH / SAS | uniswap_v2 | 0x42e0...09ce | 0.0002239753931 |
| LEASH / 0NE | shibaswap | 0xb665...8752 | 0.0000281510974521432 |
| LEASH / USDT 88% | uniswap-v4-ethereum | 0x3d27...4bc3 | 0.0000162139469785547 |
| LEASH / ELON | shibaswap | 0xc639...55c5 | 0.0000282747993157729 |
| LEASH / SAITAMA | shibaswap | 0x84a1...7278 | 0.0000461950601 |
| LEASH / USDT | uniswap_v2 | 0x7e09...8cca | 0.0001862132853 |
| LEASH / GRPFT | shibaswap | 0x92dc...fc28 | 0.06274350062 |
| STATE / LEASH | uniswap_v2 | 0xdf1a...e9d4 | 0.01903159188 |
| LEASH / WETH | swapr_ethereum | 0xde7f...430b | 0.0004387374442 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.