| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| UCBI / USDT 0.05% | pancakeswap-v3-ethereum | 0x5c11...54cb | 1.4470919486 |
| UCBI / WETH 1% | pancakeswap-v3-ethereum | 0xa4a6...1bea | 0.9668087826 |
| UCBI / WETH 0.25% | pancakeswap-v3-ethereum | 0xf56f...eda5 | 0.8578799993 |
| UCBI / USDC 0.25% | pancakeswap-v3-ethereum | 0xab1c...8e54 | 1.0477848466 |
| UCBI / USDT 0.01% | pancakeswap-v3-ethereum | 0x5a5e...3dbf | 1.4176684566 |
| UCBI / USDT 0.3% | uniswap-v4-ethereum | 0xfe32...0360 | 0.2044680766 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.