| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| VIRTUAL / WETH 1% | uniswap_v3 | 0x95a4...3d75 | 0.804699755898424 |
| ETH / VIRTUAL 1% | uniswap-v4-ethereum | 0x0aa2...f413 | 0.80852933824683 |
| IRIS / VIRTUAL | uniswap_v2 | 0x6662...4353 | 0.805453138867223 |
| VIRTUAL / ETH 0.3% | uniswap-v4-ethereum | 0x5f7b...dd3a | 0.820718018723133 |
| STRATOS / VIRTUAL | uniswap_v2 | 0x6b6b...6fe1 | 0.83986727261036 |
| VIRTUAL / USDT 1% | uniswap-v4-ethereum | 0x5040...f45d | 2.1543712316 |
| POTUS / VIRTUAL | uniswap_v2 | 0x114f...8fef | 2.0722553287 |
| BTBB / VIRTUAL | uniswap_v2 | 0xe90f...5cdb | 0.83076350684062 |
| VIRTUAL / USDT 0.3% | uniswap-v4-ethereum | 0x4123...f32b | 0.859936865922789 |
| TST / VIRTUAL | uniswap_v2 | 0xb402...8366 | 2.0593964398 |
| eth / VIRTUAL | uniswap_v2 | 0x4e68...ac89 | 2.0770234995 |
| VIRTUAL / USDC 1% | uniswap_v3 | 0x271a...27f8 | 0.857160389763382 |
| VIRTUAL / WETH 1% | uniswap-v4-ethereum | 0xb55a...4650 | 0.808646237666262 |
| VIRTUAL / WBTC 0.3% | uniswap-v4-ethereum | 0x7f2f...a72c | 1.2119995232 |
| VIRTUAL / I.R.I.S 1% | uniswap_v3 | 0x2bb4...4d4e | 2.1122868213 |
| VIRTUAL / USDC 0.3% | uniswap-v4-ethereum | 0x1dab...320b | 1.3382469182 |
| VIRTUAL / WETH 0.05% | uniswap_v3 | 0x1259...1ef5 | 1.9718251871 |
| VIRTUAL / WETH | uniswap_v2 | 0x1688...66f6 | 0.1806604121 |
| VIRTUAL / USDC 0.01% | uniswap_v3 | 0x1a8f...9856 | 2.096433837 |
| VIRTUAL / USDT 1% | uniswap_v3 | 0xbb4b...bb59 | 0.5643728915 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.