| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| DOGE / USDT | uniswap_v2 | 0xfcd1...9ebd | 0.09244601787 |
| DOGE / WETH | uniswap_v2 | 0xc006...19b6 | 0.09224544653 |
| DOGE / USDT 0.3% | uniswap_v3 | 0x1ab3...b1b2 | 0.09315367946 |
| DOGE / USDC 0.25% | pancakeswap-v3-ethereum | 0xc8c5...bad1 | 0.09398235772 |
| DOGE / USDT 0.25% | pancakeswap-v3-ethereum | 0xb0fd...c80f | 0.09420332309 |
| DOGE0.5 / DOGE | uniswap_v2 | 0xdf47...0424 | 0.1225331416 |
| DOGE / USDT 0.3% | uniswap-v4-ethereum | 0xca86...e2f0 | 0.2223300815 |
| DOGE0.5 / DOGE | uniswap_v2 | 0x8a9c...8b73 | 0.101853033853324 |
| DOGE0.5 / DOGE | uniswap_v2 | 0x0fc3...5fd0 | 0.073278771349542831035899894128 |
| WDOGE / DOGE 0.3% | uniswap_v3 | 0x5b04...8636 | 0.100609349 |
| DOGE / $swap | uniswap_v2 | 0xc65b...0c54 | 0.09600108647 |
| GreennY / DOGE | uniswap_v2 | 0xd055...c065 | 0.1030312501 |
| DOGE / 🍿 1% | uniswap_v3 | 0x67d4...03b0 | 0.1699964311 |
| DOGE / RIPDOGE 1% | uniswap_v3 | 0x019e...2089 | 0.196744290039771 |
| Doge0.5 / DOGE | uniswap_v2 | 0xd659...5a3b | 0.0897273815962746249645713998027562969629207665680742277374440798666057221509047008905636519 |
| IMP / DOGE | uniswap_v2 | 0x6a4c...1df3 | 0.393254089568163 |
| DOGE / Doge0.5 | uniswap_v2 | 0xe60b...e665 | 0.0965609899404016928472375427295927769625883281831495991933018082058263410962667461180078896 |
| DOGE² / DOGE | uniswap_v2 | 0x8c97...abe2 | 0.081837408453276464660703722861444282371881067209737631662829003835865701953547692033578856 |
| SHIOGE / DOGE | uniswap_v2 | 0xf4f8...84ad | 0.0844397144080013195364960194594489855247297740341538169383792780965121175116376217186554528 |
| DOGEx2 / DOGE | uniswap_v2 | 0x22ec...a126 | 0.0844397144080013195364960194594489855247297740341538169383792780965121175116376217186554528 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.