| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| DENT / WETH 1% | uniswap_v3 | 0x8b6e...df6e | 0.000258913734675616 |
| DENT / WETH | uniswap_v2 | 0x9a63...a6e0 | 0.000263968223643125 |
| DENT / ETH 0.3% | uniswap-v4-ethereum | 0x71ad...cefa | 0.000394351247527293 |
| DENT / KABOSU | uniswap_v2 | 0x6082...4dd1 | 0.000256111535469749 |
| DENT / VRA | uniswap_v2 | 0x0417...9347 | 0.000244007360714658 |
| DENT / SHIB | shibaswap | 0xc3d7...1169 | 0.000253766532587271 |
| DENT / USDT 0.81% | uniswap-v4-ethereum | 0x61d8...d83b | 0.0006764333921 |
| DENT / USDT 0.5% | uniswap-v4-ethereum | 0x3fd7...94e7 | 0.0007719040719 |
| DENT / USDT 0.2% | uniswap-v4-ethereum | 0xb588...c4a0 | 0.0007476130956 |
| DENT / VITA 0.3% | uniswap_v3 | 0x64cb...b7d1 | 0.0009316971646 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.