| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| BEARDY / WETH 1% | uniswap_v3 | 0xbd35...a42a | 0.00004313907823 |
| BEARDY / 転生 0.3% | uniswap_v3 | 0x774e...0f92 | 0.00004227144763 |
| BEARDY / USDC 1% | uniswap_v3 | 0xef91...0943 | 0.00004264852433 |
| BEARDY / TEL 1% | uniswap_v3 | 0x1cae...f0bb | 0.00004239101027 |
| BEARDY / NEMO 1% | uniswap_v3 | 0xd8f6...dffe | 0.00004154249814 |
| BEARDY / 転生 1% | uniswap-v4-ethereum | 0xd830...4fb7 | 0.00004323595861 |
| BEARDY / TSUKA 1% | uniswap_v3 | 0x5f1b...e53e | 0.00004288954375 |
| Okinami / BEARDY 1% | uniswap_v3 | 0xafd3...d19e | 0.0000434860846779235 |
| BEARDY / HOSHI 1% | uniswap_v3 | 0x8455...90d8 | 0.00004427418516 |
| BEARDY / ETH 1% | uniswap-v4-ethereum | 0xad71...5959 | 0.00004552876266 |
| BEARDY / PEPE 1% | uniswap_v3 | 0x13f8...3b54 | 0.00004215195387 |
| BEARDY / SHI 1% | uniswap_v3 | 0x9670...382a | 0.00004409840439 |
| BEARDY / ODIN 1% | uniswap_v3 | 0x8d98...f7a8 | 0.00004289728058 |
| BEARDY / ODIN | uniswap_v2 | 0x2ef2...c751 | 0.00004577853994 |
| BEARDY / BEAST 1% | uniswap_v3 | 0x3014...6ea3 | 0.00004323442669 |
| BEARDY / USDC 1% | uniswap-v4-ethereum | 0xf7ea...ff66 | 0.00004430176969 |
| BEARDY / KŪKA 0.01% | uniswap_v3 | 0x1ca0...8721 | 0.00004237264703 |
| BEARDY / NEMO 0.01% | uniswap_v3 | 0xf51c...5317 | 0.00004323442669 |
| STATE / BEARDY 1% | uniswap_v3 | 0x4f59...b1ed | 0.0000433514380669539 |
| BEARDY / SHIB 1% | uniswap_v3 | 0xea2d...0350 | 0.00004332814525 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.