| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| METAon / USDT 40% | uniswap-v4-ethereum | 0x99b5...744a | 918.867421762 |
| METAon / USDC 30% | uniswap-v4-ethereum | 0x55c4...78e5 | 604.602440241 |
| METAon / USDC 29% | uniswap-v4-ethereum | 0x6df9...8715 | 609.7595125246 |
| METAon / USDC 70% | uniswap-v4-ethereum | 0x01df...63e1 | 3310.3896694359 |
| METAon / USDC 90% | uniswap-v4-ethereum | 0x3845...0ad1 | 86.3025756443 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.