| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| DRGN / ETH 1% | uniswap-v4-ethereum | 0xca84...7f48 | 0.01130024622 |
| DRGN / WETH 1% | uniswap_v3 | 0x44f9...d1f7 | 0.01122504383 |
| DRGN / WETH | uniswap_v2 | 0x4f9f...ae71 | 0.01138126999 |
| DRGN / USDC 1% | uniswap-v4-ethereum | 0x2d93...cc48 | 0.01118363524 |
| DRGN / cbBTC 0.7% | uniswap-v4-ethereum | 0xadf3...922e | 0.011283582 |
| DRGN / USDC 1.25% | uniswap-v4-ethereum | 0x64b1...6657 | 0.0109972407 |
| DRGN / WETH | sushiswap | 0xe0a0...67e2 | 0.01115196779 |
| DRGN / cbBTC 2.5% | uniswap-v4-ethereum | 0x3ae6...c75b | 0.02880788094 |
| DRGN / USDC 0.85% | uniswap-v4-ethereum | 0xfef5...9be9 | 0.01280905409 |
| DRGN / MTR 2% | uniswap-v4-ethereum | 0xa62b...0a84 | 0.0107277873 |
| DRGN / cbBTC 1% | uniswap-v4-ethereum | 0xb509...1d7d | 0.01096436644 |
| DRGN / WETH 1% | sushiswap-v3-ethereum | 0x7ce0...9bf8 | 0.008138147876 |
| DRGN / USDC 2% | uniswap-v4-ethereum | 0x6761...4716 | 0.01316619284 |
| DRGN / CEL 1% | uniswap_v3 | 0xd321...ebda | 0.0526680607766445 |
| MTR / DRGN | uniswap_v2 | 0x26f1...80ab | 0.01518908442 |
| DRGN / APE 1% | uniswap_v3 | 0x76e2...c89f | 0.0167807186370327 |
| DRGN / USDC 1% | uniswap_v3 | 0x63bd...0619 | 0.0102986863758928 |
| DRGN / IMX 1% | uniswap_v3 | 0x9879...e3e8 | 0.01378179995096588671857019952164 |
| DRGN / UNI 1% | uniswap_v3 | 0x6de1...5ce3 | 0.01378179995096588671857019952164 |
| DRGN / MATIC 1% | uniswap_v3 | 0xea28...0de5 | 0.00654580149221014669107273326868 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.