| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| PEIPEI / WETH | uniswap_v2 | 0xbf16...9b8b | 0.0000000121642362786104 |
| PEIPEI / WETH 1% | uniswap_v3 | 0x9e0f...b534 | 0.0000000122171642981913 |
| PEIPEI / TrumpBucks 1% | uniswap-v4-ethereum | 0xa92f...7f91 | 0.0000000122258832013847 |
| PEIPEI / ETH 1% | uniswap-v4-ethereum | 0x9144...57a2 | 0.0000000120189296644801 |
| PEIPEI / BOYS 1% | uniswap-v4-ethereum | 0xfaa9...b521 | 0.00000003772516593 |
| PEIPEI / USDT 88% | uniswap-v4-ethereum | 0xc0b7...7554 | 0.0000002785085836 |
| PEIPEI / TrumpBucks 1% | uniswap_v3 | 0x2136...79d2 | 0.00000003610633989 |
| PEIPEI / RUGZ | uniswap_v2 | 0x1414...9f19 | 0.00000006295529102 |
| PEIPEI / ETH 0.01% | uniswap-v4-ethereum | 0x2692...cdfd | 0.0000000600275697 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.