| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| CELR / WETH | uniswap_v2 | 0x7520...0c62 | 0.00347357347074506 |
| CELR / WETH 1% | uniswap_v3 | 0xaff1...0a8d | 0.00355261511720492 |
| CELR / ETH 1% | uniswap-v4-ethereum | 0xb60b...d468 | 0.01502890738 |
| CELR / WETH 0.3% | uniswap_v3 | 0xa957...6fa0 | 0.01345845262 |
| CELR / USDT 88% | uniswap-v4-ethereum | 0x1f2e...cf94 | 0.001762483682 |
| CELR / KABOSU | uniswap_v2 | 0x03c5...7678 | 0.003814758968 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.