| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| TSMon / ETH 47% | uniswap-v4-ethereum | 0xdb14...790c | 532.4061424176 |
| TSMon / USDT 50% | uniswap-v4-ethereum | 0x2d7f...fb75 | 852.4830357836 |
| TSMon / USDC 29% | uniswap-v4-ethereum | 0x3058...a195 | 400.8459777234 |
| TSMon / USDC 70% | uniswap-v4-ethereum | 0x60dc...6e92 | 1444.4860646371 |
| TSMon / USDT 80% | uniswap-v4-ethereum | 0x2d1c...c8c9 | 1496.5129835611 |
| TSMon / USDC 90% | uniswap-v4-ethereum | 0xee52...74f8 | 2655.0033259995 |
| TSMon / USDC 28% | uniswap-v4-ethereum | 0x3eae...2163 | 506.1737126857 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.