| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| WOJAK / WETH | uniswap_v2 | 0x0f23...496e | 0.0000197843173217521 |
| rust / WOJAK 1% | uniswap-v4-ethereum | 0x199c...e098 | 0.0000199570812819936 |
| WOJAK / WETH 1% | uniswap_v3 | 0x7316...4db1 | 0.0000207237486835472 |
| WOJAK / OX | uniswap_v2 | 0xb5a0...fc48 | 0.0000204882009141796 |
| NULL / WOJAK | uniswap_v2 | 0x7d2f...38d6 | 0.0000205045652423518 |
| WOJAK / USDC 88% | uniswap-v4-ethereum | 0xc9c3...cd4c | 0.000022269776463201 |
| WOJAK / WETH | sushiswap | 0x6010...ee30 | 0.0000472346648809056 |
| WOJAK / ETH 99% | uniswap-v4-ethereum | 0x3106...cad8 | 0.0000017774583480153 |
| WOJAK / PEPE 1% | uniswap_v3 | 0x0b4c...2dbd | 0.000428533284062117 |
| WOJAK / WETH 0.3% | uniswap_v3 | 0x35f0...f454 | 0.00133189700765301 |
| WOJAK / VYPER 1% | uniswap_v3 | 0x67ca...8ad2 | 0.0003508761997 |
| WOJAK / KABOSU | uniswap_v2 | 0xbfa0...48bd | 0.0004939227853 |
| CANA / WOJAK | uniswap_v2 | 0x9b2e...6657 | 0.0001468647637 |
| WOJAK / DOGE2.0 | uniswap_v2 | 0xcfde...d0fa | 0.000105288933533086 |
| WOJAK0.5 / WOJAK | uniswap_v2 | 0x5383...f6b2 | 0.000142624125511862 |
| $WOJACKING / WOJAK | uniswap_v2 | 0x7061...3882 | 0.000123953488030891 |
| WOJAK / BURN 1% | uniswap_v3 | 0x1593...964e | 0.000178838756803812 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.