| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| WOJAK / WETH | uniswap_v2 | 0x0f23...496e | 0.000149756756535779 |
| WOJAK / WETH 1% | uniswap_v3 | 0x7316...4db1 | 0.00015014068446875 |
| rust / WOJAK 1% | uniswap-v4-ethereum | 0x199c...e098 | 0.000150804368535299 |
| WOJAK / OX | uniswap_v2 | 0xb5a0...fc48 | 0.000151197328377815 |
| CANA / WOJAK | uniswap_v2 | 0x9b2e...6657 | 0.000150740329146107 |
| NULL / WOJAK | uniswap_v2 | 0x7d2f...38d6 | 0.000155752337568753 |
| WOJAK / WETH | sushiswap | 0x6010...ee30 | 0.0001861412304 |
| WOJAK / VYPER 1% | uniswap_v3 | 0x67ca...8ad2 | 0.0003508761997 |
| WOJAK / KABOSU | uniswap_v2 | 0xbfa0...48bd | 0.0004939227853 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.