| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| CELR / WETH | uniswap_v2 | 0x7520...0c62 | 0.00265867088 |
| CELR / WETH 1% | uniswap_v3 | 0xaff1...0a8d | 0.002660026261 |
| CELR / ETH 1% | uniswap-v4-ethereum | 0xb60b...d468 | 0.01502890738 |
| CELR / WETH 0.3% | uniswap_v3 | 0xa957...6fa0 | 0.01345845262 |
| CELR / USDT 88% | uniswap-v4-ethereum | 0x1f2e...cf94 | 0.001762483682 |
| CELR / USDC 80% | uniswap-v4-ethereum | 0x9adf...7654 | 0.002426596339 |
| CELR / KNX 0.3% | uniswap_v3 | 0x72e9...ec4f | 0.0174475361449834449535178140028 |
| CELR / KABOSU | uniswap_v2 | 0x03c5...7678 | 0.003814758968 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.