| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| RADAR / ETH 0.3% | uniswap-v4-ethereum | 0xd180...797e | 0.000529458350072503 |
| RADAR / WETH | sushiswap | 0x559e...52cb | 0.000531936269155317 |
| RADAR / WETH 1% | sushiswap-v3-ethereum | 0x4c45...d2e7 | 0.000585503000715767 |
| RADAR / USDT 1% | uniswap_v3 | 0x105f...bfc8 | 0.02333810449 |
| RADAR / WETH 0.01% | sushiswap-v3-ethereum | 0xfaa5...b0bc | 0.000559281315216481 |
| RADAR / WETH | uniswap_v2 | 0x0fd3...7410 | 0.00348470455 |
| RADAR / KABOSU | uniswap_v2 | 0x9353...0c47 | 0.003593322496 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.