| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| BTM / USDT 0.05% | uniswap_v3 | 0xe68f...fb39 | 0.0075034175962776 |
| BTM / SUP | uniswap_v2 | 0x1234...8440 | 0.008347958393 |
| BTM / USDT 0.3% | uniswap_v3 | 0x116d...75ae | 0.0008767777352 |
| BTM / USDT | uniswap_v2 | 0x3ab0...b9e4 | 0.01452750712 |
| BTM / WETH | uniswap_v2 | 0xe314...2404 | 0.0005019911287 |
| BTM / ETH 90% | uniswap-v4-ethereum | 0x4a8c...fb77 | 0.04358448013 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.