| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| LEE / USDT 1% | uniswap_v3 | 0xca3c...863d | 0.00007125803882 |
| LEE / WETH 1% | uniswap_v3 | 0x5ba9...1f5a | 0.00006962855481 |
| LEE / USDC 0.3% | uniswap_v3 | 0x342c...c3bf | 0.00008033639274 |
| LEE / WBTC 0.3% | uniswap-v4-ethereum | 0x3eab...3d40 | 0.0000719300763 |
| LEE / USDC 0.3% | uniswap-v4-ethereum | 0x3fc0...f0db | 0.00007149278026 |
| LEE / USDC | uniswap_v2 | 0xbcc1...125b | 0.00007143234106 |
| LEE / WBTC | uniswap_v2 | 0x0e83...548e | 0.00008649499773 |
| LEE / WBTC 0.3% | uniswap_v3 | 0xd043...592a | 0.00008327402232 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.