| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| BEARDY / TSUKA 1% | uniswap_v3 | 0x5f1b...e53e | 0.0000923121540710858 |
| Okinami / BEARDY 1% | uniswap_v3 | 0xafd3...d19e | 0.0000923121540710858 |
| BEARDY / 転生 0.3% | uniswap_v3 | 0x774e...0f92 | 0.0000923097492555878 |
| BEARDY / USDC 1% | uniswap_v3 | 0xef91...0943 | 0.0000909175332849816 |
| BEARDY / WETH 1% | uniswap_v3 | 0xbd35...a42a | 0.0000895329557811903 |
| BEARDY / HOSHI 1% | uniswap_v3 | 0x8455...90d8 | 0.00009272654251 |
| BEARDY / NEMO 1% | uniswap_v3 | 0xd8f6...dffe | 0.00008860561225 |
| BEARDY / ODIN 1% | uniswap_v3 | 0x8d98...f7a8 | 0.00008841835185 |
| BEARDY / TEL 1% | uniswap_v3 | 0x1cae...f0bb | 0.0000867806533653301 |
| BEARDY / PEPE 1% | uniswap_v3 | 0x13f8...3b54 | 0.0000867487427892768 |
| BEARDY / JEXXX 1% | uniswap_v3 | 0x78aa...a5e9 | 0.00008872560947 |
| BEARDY / BEAST 1% | uniswap_v3 | 0x3014...6ea3 | 0.00008841835185 |
| BEARDY / ODIN | uniswap_v2 | 0x2ef2...c751 | 0.00009082931964 |
| BEARDY / KŪKA 0.01% | uniswap_v3 | 0x1ca0...8721 | 0.000088442332124805 |
| BEARDY / SHI 1% | uniswap_v3 | 0x9670...382a | 0.00009081447484 |
| BEARDY / SHIB 1% | uniswap_v3 | 0xea2d...0350 | 0.00009108645724 |
| BEARDY / NEMO 0.01% | uniswap_v3 | 0xf51c...5317 | 0.0000847042542529563 |
| BEARDY / CAW 0.3% | uniswap_v3 | 0x0045...c3f5 | 0.00008946609511 |
| STATE / BEARDY 1% | uniswap_v3 | 0x4f59...b1ed | 0.00008674874279 |
| BEARDY / O 0.3% | uniswap_v3 | 0x46db...00ef | 0.0000847042542529563 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.