| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| GEORGE / WETH | uniswap_v2 | 0xacba...145e | 0.00004437296407 |
| GEORGE / USDC 15% | uniswap-v4-ethereum | 0xc1a9...fc88 | 0.0001257476965 |
| GEORGE / ETH 4% | uniswap-v4-ethereum | 0xcb64...c88a | 0.0000558000711 |
| GEORGE / USDC 13% | uniswap-v4-ethereum | 0xa7ea...f7f8 | 0.00004393719831 |
| GEORGE / USDC 14.89% | uniswap-v4-ethereum | 0x3cbf...721f | 0.0001814586833 |
| GEORGE / USDC 14.99% | uniswap-v4-ethereum | 0xbcf6...429a | 0.00004437482323 |
| GEORGE / USDC 14.888% | uniswap-v4-ethereum | 0x4fc2...ec55 | 0.0001959643681 |
| GEORGE / USDC 8.889% | uniswap-v4-ethereum | 0x0a02...7ac6 | 0.00004561821099 |
| GEORGE / USDC 14.66% | uniswap-v4-ethereum | 0xd5c9...0d7c | 0.0001650818318 |
| GEORGE / USDC 9.99% | uniswap-v4-ethereum | 0x11c6...52a1 | 0.00004582695954 |
| GEORGE / USDC 14.659% | uniswap-v4-ethereum | 0xcc29...9af9 | 0.0001161681764 |
| GEORGE / USDC 14.993% | uniswap-v4-ethereum | 0xf52a...b92f | 0.0001851253596 |
| GEORGE / USDC 7.88% | uniswap-v4-ethereum | 0x6395...7db3 | 0.0001356266554 |
| GEORGE / USDC 14.886% | uniswap-v4-ethereum | 0x5133...9ebb | 0.0001533926955 |
| GEORGE / USDC 14.854% | uniswap-v4-ethereum | 0x2d64...dcd7 | 0.0002007635669 |
| GEORGE / USDC 2.111% | uniswap-v4-ethereum | 0xe13c...69cc | 0.0001818019845 |
| GEORGE / USDC 3.98% | uniswap-v4-ethereum | 0xbd74...c382 | 0.0001257020744 |
| GEORGE / USDC 2% | uniswap-v4-ethereum | 0x29b8...e333 | 0.0001242086409 |
| GEORGE / USDC 3.3% | uniswap-v4-ethereum | 0x300b...a80c | 0.0001541624849 |
| GEORGE / USDC 3% | uniswap-v4-ethereum | 0x035e...da20 | 0.000247534207 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.