| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| VIRTUAL / WETH 1% | uniswap_v3 | 0x95a4...3d75 | 0.856267036235772 |
| ETH / VIRTUAL 1% | uniswap-v4-ethereum | 0x0aa2...f413 | 0.844011072779928 |
| IRIS / VIRTUAL | uniswap_v2 | 0x6662...4353 | 0.856173133717551 |
| KABOSU / VIRTUAL | uniswap_v2 | 0x75ba...9d41 | 0.864712967285285 |
| VIRTUAL / USDC 1% | uniswap_v3 | 0x271a...27f8 | 0.864647094440487 |
| VIRTUAL / ETH 0.3% | uniswap-v4-ethereum | 0x5f7b...dd3a | 0.859559867522038 |
| VIRTUAL / WETH 1% | uniswap-v4-ethereum | 0xb55a...4650 | 0.886897453215583 |
| STRATOS / VIRTUAL | uniswap_v2 | 0x6b6b...6fe1 | 0.996622149936227 |
| VIRTUAL / USDT 1% | uniswap-v4-ethereum | 0x5040...f45d | 2.1543712316 |
| POTUS / VIRTUAL | uniswap_v2 | 0x114f...8fef | 2.0722553287 |
| VIRTUAL / USDT 0.3% | uniswap-v4-ethereum | 0x4123...f32b | 1.2090349016 |
| TST / VIRTUAL | uniswap_v2 | 0xb402...8366 | 2.0593964398 |
| eth / VIRTUAL | uniswap_v2 | 0x4e68...ac89 | 2.0770234995 |
| VIRTUAL / WBTC 0.3% | uniswap-v4-ethereum | 0x7f2f...a72c | 1.2119995232 |
| VIRTUAL / I.R.I.S 1% | uniswap_v3 | 0x2bb4...4d4e | 2.1122868213 |
| VIRTUAL / USDC 0.3% | uniswap-v4-ethereum | 0x1dab...320b | 1.3382469182 |
| VIRTUAL / WETH 0.05% | uniswap_v3 | 0x1259...1ef5 | 1.9718251871 |
| VIRTUAL / USDC 0.01% | uniswap_v3 | 0x1a8f...9856 | 2.096433837 |
| VIRTUAL / USDT 1% | uniswap_v3 | 0xbb4b...bb59 | 0.5643728915 |
| WETH / VIRTUAL | uniswap_v2 | 0x73e2...d52b | 2.192971487 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.