| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| HOTCROSS / USDC 37.8% | uniswap-v4-ethereum | 0x06d7...63f5 | 0.0000599558386724768 |
| HOTCROSS / WETH | uniswap_v2 | 0x1cc4...43c5 | 0.0000667452156630235 |
| HOTCROSS / USDC | uniswap_v2 | 0x63bf...15af | 0.0000645557566478025 |
| HOTCROSS / WETH | orion-ethereum | 0xa98d...afdc | 0.0000639392406724305 |
| HOTCROSS / USDT | uniswap_v2 | 0x96f5...0b8d | 0.0000503687262326253 |
| HOTCROSS / USDT | sushiswap | 0x0bdc...b6a0 | 0.0000530826367526037 |
| HOTCROSS / USDT | orion-ethereum | 0xfd41...96f1 | 0.0000458564269934444 |
| HOTCROSS / ETH 1% | uniswap-v4-ethereum | 0x6bdb...b298 | 0.0000222748628704443 |
| HOTCROSS / USDC 38% | uniswap-v4-ethereum | 0xa591...831b | 0.000103245834 |
| HOTCROSS / TKP | uniswap_v2 | 0x5481...8f8d | 0.006943781936 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.