| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| TSMon / USDT 50% | uniswap-v4-ethereum | 0x2d7f...fb75 | 683.893798857373 |
| TSMon / ETH 47% | uniswap-v4-ethereum | 0xdb14...790c | 327.8197787016 |
| TSMon / USDC 29% | uniswap-v4-ethereum | 0x3058...a195 | 568.220941257247 |
| TSMon / USDC 70% | uniswap-v4-ethereum | 0x60dc...6e92 | 1373.1981347468 |
| TSMon / USDT 80% | uniswap-v4-ethereum | 0x2d1c...c8c9 | 1496.5129835611 |
| TSMon / USDC 90% | uniswap-v4-ethereum | 0xee52...74f8 | 2655.0033259995 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.