| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| BAD / WETH | uniswap_v2 | 0x29c8...010e | 0.00000000174705570831302 |
| BAD / WETH | shibaswap | 0x6f4a...bd6e | 0.00000000174145536882244 |
| BAD / WETH | sushiswap | 0x57fb...60a7 | 0.00000000174005219549151 |
| BAD / SHIB | shibaswap | 0x396d...5a92 | 0.00000000182734673193345 |
| BAD / TREAT 1% | uniswap-v4-ethereum | 0x2d9e...2879 | 0.00000001032107416 |
| BAD / ETH 0.3% | uniswap-v4-ethereum | 0x1e5d...642f | 0.000000009615159344 |
| BAD / EDGE 1% | uniswap-v4-ethereum | 0xc76f...7066 | 0.00000001041480931 |
| BAD / WETH 1% | uniswap_v3 | 0x3f75...761c | 0.00000001526268484 |
| BAD / USDT 88% | uniswap-v4-ethereum | 0x8955...b807 | 0.000000002445028801 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.