| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| FREE / WETH 1% | uniswap_v3 | 0x78ab...78cf | 0.00006347879412 |
| FREE / WETH | uniswap_v2 | 0xebd7...c498 | 0.00006475749136 |
| FREE / PEOPLE 1% | uniswap_v3 | 0x82ab...0ee7 | 0.000567240260041823 |
| FREE / USDC 1% | uniswap_v3 | 0x2770...7e68 | 0.0005358424656 |
| FREE / PEOPLE | uniswap_v2 | 0xb9e1...264b | 0.0 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.