| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| HOTCROSS / USDC 37.8% | uniswap-v4-ethereum | 0x06d7...63f5 | 0.00007734679378 |
| HOTCROSS / WETH | uniswap_v2 | 0x1cc4...43c5 | 0.00004114527454 |
| HOTCROSS / USDC | uniswap_v2 | 0x63bf...15af | 0.00004365446792 |
| HOTCROSS / WETH | orion-ethereum | 0xa98d...afdc | 0.00004303954445 |
| HOTCROSS / USDC 38% | uniswap-v4-ethereum | 0xa591...831b | 0.000103245834 |
| HOTCROSS / USDT | uniswap_v2 | 0x96f5...0b8d | 0.00005115567002 |
| HOTCROSS / USDT | sushiswap | 0x0bdc...b6a0 | 0.00005071873798 |
| HOTCROSS / USDT | orion-ethereum | 0xfd41...96f1 | 0.00005994248684 |
| HOTCROSS / ETH 1% | uniswap-v4-ethereum | 0x6bdb...b298 | 0.00003618621574 |
| HOTCROSS / TKP | uniswap_v2 | 0x5481...8f8d | 0.006943781936 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.