| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| OS / WETH 1% | uniswap_v3 | 0xccc4...4707 | 0.01818966023 |
| OS / UniFi 1% | uniswap_v3 | 0x856d...4eb1 | 0.06871474995 |
| OS / WETH | sushiswap | 0x9fda...4728 | 0.0206090108 |
| OS / USDC | sushiswap | 0x9597...d4b0 | 0.1465677585 |
| OS / buidl 1% | uniswap_v3 | 0x7370...1c5e | 13.1887298206993 |
| DOS / OS 0.01% | uniswap_v3 | 0xdb93...fc46 | 4.55988739513788202681814851088 |
| OS / USDC 1% | uniswap_v3 | 0x4de3...6799 | 4.53324782126559354589627466411 |
| arte / OS 1% | uniswap_v3 | 0x35f4...054f | 5.53226344644209289322429850281 |
| pETHOS / OS 1% | uniswap_v3 | 0xc985...055f | 0.472225864186973 |
| OS / USDC 0.01% | uniswap_v3 | 0x60db...0f98 | 0.834406271015989 |
| OS / WETH 0.3% | uniswap_v3 | 0x4c17...38d9 | 6.59936464877622489427411934421 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.