| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| DOGE / USDT | uniswap_v2 | 0xfcd1...9ebd | 0.145867047626768 |
| DOGE / WETH | uniswap_v2 | 0xc006...19b6 | 0.146587600162258 |
| WDOGE / DOGE 0.3% | uniswap_v3 | 0x5b04...8636 | 0.146717331578054 |
| DOGE / USDT 0.3% | uniswap_v3 | 0x1ab3...b1b2 | 0.147712842124893 |
| DOGE / USDT 0.25% | pancakeswap-v3-ethereum | 0xb0fd...c80f | 0.145641566782189 |
| DOGE0.5 / DOGE | uniswap_v2 | 0xdf47...0424 | 0.2802477222 |
| DOGE / USDC 0.25% | pancakeswap-v3-ethereum | 0xc8c5...bad1 | 0.1421839047 |
| DOGE / USDT 0.3% | uniswap-v4-ethereum | 0xca86...e2f0 | 0.2223300815 |
| ADvt / DOGE | uniswap_v2 | 0x6edd...0016 | 0.1372257112 |
| DOGE / 🍿 1% | uniswap_v3 | 0x67d4...03b0 | 0.1699964311 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.