| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| BEAM / WETH | uniswap_v2 | 0x180e...c6e4 | 0.00326877811508775 |
| BEAM / WETH 0.3% | uniswap_v3 | 0xb6b9...6d27 | 0.0032676905028855 |
| BEAM / WETH 1% | uniswap_v3 | 0x318f...89b8 | 0.00325565212414037 |
| BEAM / KABOSU | uniswap_v2 | 0xfc8c...d352 | 0.00346653603979789 |
| BEAM / EVT | pancakeswap_ethereum | 0x3cde...b76f | 0.00325737332642283 |
| BEAM / ETH 1% | uniswap-v4-ethereum | 0x9590...b9c2 | 0.00351429385467747 |
| BEAM / WBTC 1% | uniswap-v4-ethereum | 0xeca0...4e79 | 0.008591721109 |
| BEAM / WETH | x7-finance | 0x5ede...d52e | 0.007140499011 |
| BEAM / ETH 0.05% | uniswap-v4-ethereum | 0x40a9...7488 | 0.008722379908 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.