| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| LSK / ETH 0.3% | uniswap-v4-ethereum | 0x6af6...d1d2 | 0.201712734511056 |
| LSK / KABOSU | uniswap_v2 | 0x8bc0...03f0 | 0.208722026513828 |
| LSK / USDT 88% | uniswap-v4-ethereum | 0x588a...becf | 3.2070053386 |
| LSK / USDT 3% | uniswap-v4-ethereum | 0x036d...a143 | 0.3224217582 |
| LSK / WETH 0.3% | uniswap_v3 | 0xae3d...6eee | 0.4135947758 |
| LSK / WETH | uniswap_v2 | 0x232f...0de4 | 0.00005490747803 |
| LSK / USDT 0.98% | uniswap-v4-ethereum | 0xb104...e01e | 0.3935610068 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.