| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| LOKA / USDC | uniswap_v2 | 0x35a0...4e2b | 0.0259508356741243 |
| LOKA / USDC 2.9% | uniswap-v4-ethereum | 0xd1ac...eb33 | 0.0261733966833276 |
| LOKA / USDT 3% | uniswap-v4-ethereum | 0xbcb5...535a | 0.1521728273 |
| LOKA / USDC 1% | uniswap-v4-ethereum | 0x6272...1764 | 0.3644450602 |
| LOKA / USDT 2% | uniswap-v4-ethereum | 0x36ce...d442 | 0.02646921046 |
| LOKA / ETH 0.3% | uniswap-v4-ethereum | 0x01e7...b953 | 0.2298098254 |
| LOKA / ETH 5% | uniswap-v4-ethereum | 0xab78...0bc8 | 0.3976930106 |
| LOKA / USDC 0.3% | uniswap-v4-ethereum | 0x7d06...67ff | 0.3959985661 |
| A2Z / LOKA 1% | uniswap-v4-ethereum | 0x88ae...800c | 0.0286022758426124 |
| LOKA / KABOSU | uniswap_v2 | 0xe900...dd67 | 0.1087263596 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.