| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| TOMI / USDT 3% | uniswap-v4-ethereum | 0x9b73...8d0f | 0.0000000207741371952613 |
| TOMI / USDT 80% | uniswap-v4-ethereum | 0x2e60...e898 | 0.0000000150620458111378 |
| TOMI / USDC 14.9% | uniswap-v4-ethereum | 0x6aac...202d | 0.0000000210620632351539 |
| TOMI / WETH | uniswap_v2 | 0x99b1...7db4 | 0.00000002308312576029 |
| TOMI / USDT | uniswap_v2 | 0xe5d5...6f2b | 0.0000000213777285682969 |
| TOMI / ETH 8% | uniswap-v4-ethereum | 0x88ea...4f6c | 0.0000010033839 |
| TOMI / USDT 55% | uniswap-v4-ethereum | 0xde72...1219 | 0.0000000196815093218707 |
| TOMI / USDC 9.8% | uniswap-v4-ethereum | 0xea0c...297b | 0.0001374339293 |
| TOMI / USDC 9% | uniswap-v4-ethereum | 0x361e...7787 | 0.0000003572567196 |
| TOMI / ETH 90% | uniswap-v4-ethereum | 0x758a...3d86 | 0.00000004415856348313 |
| TOMI / USDC 55% | uniswap-v4-ethereum | 0x6b52...5536 | 0.0000370004279 |
| TOMI / USDT 88% | uniswap-v4-ethereum | 0x6664...58f6 | 0.0000000284015886415757 |
| TOMI / ETH 5% | uniswap-v4-ethereum | 0x3eb3...ebac | 0.00001981161411 |
| TOMI / USDT 90% | uniswap-v4-ethereum | 0xc99d...4915 | 0.000004278306416 |
| TOMI / USDC 80% | uniswap-v4-ethereum | 0xde8d...a2af | 0.0000000294959599846583 |
| TOMI / USDT 89.998% | uniswap-v4-ethereum | 0xb9c8...48af | 0.0000001619793373 |
| TOMI / USDC 88% | uniswap-v4-ethereum | 0xcfc8...6907 | 0.0000000350873187082778 |
| TOMI / USDT 89.999% | uniswap-v4-ethereum | 0x2195...58fc | 0.0000005399728656 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.