| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| wOCT / ETH 0.3% | uniswap-v4-ethereum | 0x5eb4...f854 | 0.02185617334 |
| wOCT / WETH 1% | uniswap_v3 | 0xc68d...f4da | 0.03219792203 |
| wOCT / USDT 10% | uniswap-v4-ethereum | 0xcdec...13d0 | 0.08189377774 |
| wOCT / ETH 15% | uniswap-v4-ethereum | 0xd780...12ff | 0.02949757832 |
| wOCT / ETH 1% | uniswap-v4-ethereum | 0x7d74...2308 | 0.04030427046 |
| wOCT / USDC 50% | uniswap-v4-ethereum | 0x67d4...aa03 | 0.0466898061 |
| wOCT / USDT 1.889% | uniswap-v4-ethereum | 0xdeee...3070 | 0.02699957531 |
| wOCT / USDC 1% | uniswap-v4-ethereum | 0x6396...03d3 | 0.03736275285 |
| wOCT / USDC 1.88% | uniswap-v4-ethereum | 0x3773...6cd0 | 0.05165082619 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.