| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| basedAI / pepecoin 1% | uniswap_v3 | 0xa0d9...fc75 | 0.0959898273391785 |
| basedAI / WETH | uniswap_v2 | 0x8d58...4072 | 0.0964370963732486 |
| basedAI / WETH 1% | uniswap_v3 | 0xfa4a...0ce6 | 0.0963292479352696 |
| basedAI / BCRED 1% | uniswap-v4-ethereum | 0x5119...1846 | 0.0962703254496633 |
| basedAI / pepecoin 1% | uniswap-v4-ethereum | 0x473b...99e4 | 0.3437974589 |
| basedAI / USDT 88% | uniswap-v4-ethereum | 0xddd6...f9ee | 0.01121834292 |
| basedAI / ETH 1% | uniswap-v4-ethereum | 0xad9c...97bb | 0.9791255877 |
| basedAI / pepecoin | pepedex | 0x3673...77ed | 0.105914915470684 |
| basedAI / SEETHE | uniswap_v2 | 0x61fb...a739 | 0.4187753864 |
| basedAI / BCRED 1% | uniswap_v3 | 0xe947...25c9 | 0.6078606082 |
| basedAI / USDC 1% | uniswap_v3 | 0x5a48...987f | 7.2782041746 |
| basedAI / pepecoin 1% | pancakeswap-v3-ethereum | 0xdc2c...97b5 | 0.0852803806399729 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.