| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| COCAINE / WETH | uniswap_v2 | 0xcd7d...85e8 | 0.00000262597556012511 |
| COCAINE / APU 1% | uniswap_v3 | 0x0ad7...7a49 | 0.00005263404273 |
| COCAINE / WBTC | uniswap_v2 | 0xde6e...2df4 | 0.0000215361016 |
| COCAINE / WETH 1% | uniswap_v3 | 0xfce0...1231 | 0.00002218579867 |
| EUROC / COCAINE | uniswap_v2 | 0x0c02...931b | 0.00001349240286 |
| COCAINE / USDC | uniswap_v2 | 0x328c...72fb | 0.00001980885994 |
| SPX2.0 / COCAINE 1% | uniswap_v3 | 0x4367...b1bf | 0.00002728501342 |
| COCAINE / BITCOIN | uniswap_v2 | 0xfdbd...3121 | 0.0000551964932 |
| COCAINE / PEPL | uniswap_v2 | 0x139c...05f3 | 0.00002315985455 |
| COCAINE / APU | uniswap_v2 | 0x8f60...d2f3 | 0.000851371671386621 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.