| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| OCC / WETH | uniswap_v2 | 0x14b6...be5a | 0.00084166169365194 |
| OCC / USDC | uniswap_v2 | 0xedf1...4757 | 0.000848216869009049 |
| OCC / WETH 1% | uniswap_v3 | 0x8897...c741 | 0.0991805213411579 |
| OCC / WETH | sushiswap | 0x7c19...c87f | 0.003402200096 |
| OCC / USDC | sushiswap | 0xd523...371d | 0.008212725861 |
| CHAKRA / OCC | uniswap_v2 | 0x2e84...775c | 0.195210419947014 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.