| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| LUCKYSLP / WETH | uniswap_v2 | 0xfd18...2e29 | 0.00000003776508545 |
| LUCKYSLP / SHIBA 1% | uniswap-v4-ethereum | 0xe29d...cb74 | 0.00000003757890254 |
| LUCKYSLP / USDC | uniswap_v2 | 0x5d6e...c532 | 0.00000003775830529 |
| LUCKYSLP / USDT | uniswap_v2 | 0x0049...9aa5 | 0.00000003798949601 |
| LUCKYSLP / PUNCH 1% | uniswap-v4-ethereum | 0x39d0...9011 | 0.0000000388274832 |
| LUCKYSLP / TKP | uniswap_v2 | 0x619e...806f | 0.00000003936641392 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.