| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| UwU / DAI 1% | uniswap_v3 | 0xd5af...e01a | 0.87606710538927 |
| UwU / WETH | curve | 0x7714...9e71 | 0.003825934057 |
| UwU / WETH 0.3% | kyberswap_elastic | 0x99da...441b | 15.2170701755266 |
| UwU / WETH 0.3% | uniswap_v3 | 0x98c5...4404 | 0.00346859074462476 |
| UwU / WETH | sushiswap | 0x3e04...6027 | 0.00352648728112346 |
| UwU / WETH 1% | uniswap_v3 | 0xfcdc...1a78 | 0.928602921233088 |
| UwU / USDT 0.3% | uniswap_v3 | 0x0dbc...550d | 0.611555524 |
| UwU / USDC | sushiswap | 0x58a3...0b42 | 0.02649702876 |
| UwU / USDT 1% | uniswap_v3 | 0x6525...e7e6 | 0.953010621062166 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.