| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| PSYOP / WETH 1% | uniswap_v3 | 0xa3bc...ea71 | 0.00001622287842 |
| PSYOP / FINALE 0.3% | uniswap_v3 | 0x9f22...1771 | 0.00001968262951 |
| PSYOP / WETH 0.3% | uniswap_v3 | 0x42d4...0811 | 0.0000195386852 |
| PSYOP / DAVE 1% | uniswap_v3 | 0xdf8b...b8f4 | 0.00001968262053 |
| PSYOP / USDC 1% | uniswap_v3 | 0x186f...c6ba | 0.00004198349683 |
| PSYOP / ETH 30% | uniswap-v4-ethereum | 0x88fd...5166 | 0.00001061292965 |
| CHURN PROTOCOL / PSYOP | uniswap_v2 | 0x513d...9aa7 | 0.0000672008350135292 |
| PSYOP / USDC 88% | uniswap-v4-ethereum | 0x91d7...92ef | 0.000002228514243 |
| PSYOP / USDC 80% | uniswap-v4-ethereum | 0x83ef...9c8b | 0.00002188406993 |
| PSYOP / LOYAL 0.3% | uniswap_v3 | 0x3618...6076 | 0.00207432376263785 |
| PSYOP / JNE 1% | uniswap_v3 | 0x884e...18a9 | 0.00001367779239 |
| PSYOP / WETH 0.05% | uniswap_v3 | 0x10ab...2737 | 0.00114793720167522 |
| PSYOP / WETH | uniswap_v2 | 0xec99...b50b | 0.000009475027644 |
| PSYOP / WETH 0.01% | uniswap_v3 | 0x8ad9...01d3 | 12601224326.3993 |
| PSYOP / LOYAL 1% | uniswap_v3 | 0x75c3...9e21 | 0.00215572293862215 |
| PSYOP / WETH | sushiswap | 0xe5d0...8e4d | 0.519445915745628 |
| PSYOP / Dyl 1% | uniswap_v3 | 0xe498...3b6c | 0.000434039050753053 |
| RAEL / PSYOP 1% | uniswap_v3 | 0x48ad...19e6 | 0.000175577319880712 |
| PSYOP / BURN 1% | uniswap_v3 | 0x7e27...9dc3 | 0.0025825268761215 |
| EPEPE / PSYOP 1% | uniswap_v3 | 0xdef3...e15d | 0.000356875110495416 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.