| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| TOMI / USDT 3% | uniswap-v4-ethereum | 0x9b73...8d0f | 0.0000000000494765709687037 |
| TOMI / USDT | uniswap_v2 | 0xe5d5...6f2b | 0.0000000000485103290605424 |
| TOMI / WETH | uniswap_v2 | 0x99b1...7db4 | 0.0000000000362121786205107 |
| TOMI / USDT 55% | uniswap-v4-ethereum | 0xde72...1219 | 0.00000000002686911153 |
| TOMI / ETH 8% | uniswap-v4-ethereum | 0x88ea...4f6c | 0.0000010033839 |
| TOMI / USDC 14.9% | uniswap-v4-ethereum | 0x6aac...202d | 0.0000000000538670000576401 |
| TOMI / ETH 89.996% | uniswap-v4-ethereum | 0xb725...7ff4 | 0.000000001151799754 |
| TOMI / USDT 80.01% | uniswap-v4-ethereum | 0x71dc...bc4a | 0.00000000002385146037 |
| TOMI / USDT 80% | uniswap-v4-ethereum | 0x2e60...e898 | 0.00000000001932833578 |
| TOMI / USDC 9.8% | uniswap-v4-ethereum | 0xea0c...297b | 0.0001374339293 |
| TOMI / USDC 9% | uniswap-v4-ethereum | 0x361e...7787 | 0.0000003572567196 |
| TOMI / ETH 90% | uniswap-v4-ethereum | 0x758a...3d86 | 0.00000004415856348 |
| TOMI / USDC 55% | uniswap-v4-ethereum | 0x6b52...5536 | 0.0000370004279 |
| TOMI / ETH 5% | uniswap-v4-ethereum | 0x3eb3...ebac | 0.00001981161411 |
| TOMI / ETH 89.997% | uniswap-v4-ethereum | 0x2361...a1bf | 0.0000000002132514992 |
| TOMI / USDT 90% | uniswap-v4-ethereum | 0xc99d...4915 | 0.000004278306416 |
| TOMI / ETH 89.999% | uniswap-v4-ethereum | 0x5556...89f2 | 0.000000006227227233 |
| TOMI / ETH 89.995% | uniswap-v4-ethereum | 0xcd04...137b | 0.0000000000754067604 |
| TOMI / USDT 89.998% | uniswap-v4-ethereum | 0xb9c8...48af | 0.0000001619793373 |
| TOMI / USDT 88% | uniswap-v4-ethereum | 0x6664...58f6 | 0.0000000001634270778 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.