| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| DOGE / USDT | uniswap_v2 | 0xfcd1...9ebd | 0.124637917711665 |
| DOGE / WETH | uniswap_v2 | 0xc006...19b6 | 0.123545832384655 |
| DOGE / USDT 0.3% | uniswap_v3 | 0x1ab3...b1b2 | 0.123682227468065 |
| DOGE0.5 / DOGE | uniswap_v2 | 0xdf47...0424 | 0.1225331416 |
| WDOGE / DOGE 0.3% | uniswap_v3 | 0x5b04...8636 | 0.123510711051681 |
| DOGE / USDT 0.25% | pancakeswap-v3-ethereum | 0xb0fd...c80f | 0.124850906984341 |
| DOGE / USDC 0.25% | pancakeswap-v3-ethereum | 0xc8c5...bad1 | 0.131273297657926 |
| DOGE / USDT 0.3% | uniswap-v4-ethereum | 0xca86...e2f0 | 0.2223300815 |
| ADvt / DOGE | uniswap_v2 | 0x6edd...0016 | 0.1325754303 |
| DOGE / 🍿 1% | uniswap_v3 | 0x67d4...03b0 | 0.1699964311 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.