| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| TRUMP / WETH | uniswap_v2 | 0xe4b8...49e8 | 0.0637863592409753 |
| TRUMP / WETH | 9inch-ethereum | 0xbc38...2c59 | 0.05997579468 |
| TRUMP / RUGZ | uniswap_v2 | 0x47f4...ce15 | 0.207510234 |
| TRUMP / WETH 0.3% | solidly-v3 | 0xb3cc...1f00 | 0.07835970069 |
| BBC / TRUMP | 9inch-ethereum | 0x2c4b...3012 | 0.1056866068 |
| TRUMP / WETH | x7-finance | 0xf304...4a33 | 0.06719010938 |
| TRUMP / USDT | uniswap_v2 | 0x5db8...f284 | 0.1055581951 |
| TRUMP / DAI | uniswap_v2 | 0x22c7...4e6b | 0.253877233515108 |
| TRUMP / MELANIA | uniswap_v2 | 0xf18f...421b | 0.3983380504 |
| $TUCKER / TRUMP | uniswap_v2 | 0xabe4...a2be | 0.1743904779 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.