| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| D / KABOSU | uniswap_v2 | 0xdeeb...e94a | 0.00769061525571113 |
| D / USDT 60% | uniswap-v4-ethereum | 0xbdb9...f5d6 | 0.00798197239235711 |
| D / USDT 50% | uniswap-v4-ethereum | 0xbab3...fbc4 | 0.01497178644 |
| D / ETH 75% | uniswap-v4-ethereum | 0x5fee...9b40 | 0.04233210746 |
| D / USDT 10% | uniswap-v4-ethereum | 0xfd13...5c0d | 0.02867961884 |
| D / USDT 19% | uniswap-v4-ethereum | 0x06de...b536 | 0.03293124098 |
| D / USDT 20% | uniswap-v4-ethereum | 0xdbaa...e9fd | 0.03103309531 |
| D / USDT 70% | uniswap-v4-ethereum | 0x4baf...32de | 0.00808172668764356 |
| D / USDT 1% | uniswap-v4-ethereum | 0x880d...1732 | 0.04501268453 |
| D / ETH 99.91% | uniswap-v4-ethereum | 0x0d16...70d7 | 0.07658411058 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.