| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| LEASH / WETH | uniswap_v2 | 0x8743...60ee | 0.000700218147276638 |
| LEASH / WETH | shibaswap | 0x5765...fb53 | 0.000705504762654743 |
| LEASH / SHIB | shibaswap | 0x351c...7a8f | 0.000689195139267698 |
| LEASH / BONE | shibaswap | 0xf6ba...d1a7 | 0.000689195139267698 |
| LEASH / xFUND | shibaswap | 0xfe8f...6e31 | 0.000733205256130204 |
| LEASH / BONE 0.3% | uniswap-v4-ethereum | 0xed95...3588 | 0.000694687192499974 |
| LEASH / KABOSU | uniswap_v2 | 0x8e6c...206f | 0.000740649664744201 |
| LEASH / ccBCH | shibaswap | 0xfc27...d150 | 0.000704654338803569 |
| LEASH / ETH 1% | uniswap-v4-ethereum | 0x1ca7...0016 | 0.000788741737741403 |
| LEASH / ELON | shibaswap | 0xc639...55c5 | 0.000686434982268571 |
| LEASH / 0NE | shibaswap | 0xb665...8752 | 0.000613643038241403 |
| LEASH / WBTC | shibaswap | 0xbcab...aa05 | 0.00059766489230552 |
| LEASH / USDT | shibaswap | 0xd9b8...b553 | 0.00113827846555757 |
| LEASH / WETH 1% | uniswap_v3 | 0xc246...2060 | 0.01605757989 |
| LEASH / SHIB 1% | uniswap_v3 | 0xb0a1...753f | 60.2979094831 |
| LEASH / USDT 8% | uniswap-v4-ethereum | 0xd456...675f | 0.006873621617 |
| LEASH / TREAT 0.3% | uniswap-v4-ethereum | 0x46ab...7c71 | 67.4385961429 |
| LEASH / SAS | uniswap_v2 | 0x42e0...09ce | 0.00127395572388161 |
| LEASH / USDT 88% | uniswap-v4-ethereum | 0x3d27...4bc3 | 0.000898060694888798 |
| LEASH / USDC 88% | uniswap-v4-ethereum | 0x2d36...ab4a | 0.00134901538932735 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.