| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| BEAM / WETH | uniswap_v2 | 0x180e...c6e4 | 0.00291683061803863 |
| BEAM / WETH 0.3% | uniswap_v3 | 0xb6b9...6d27 | 0.00288783440269469 |
| BEAM / WETH 1% | uniswap_v3 | 0x318f...89b8 | 0.00288398511162825 |
| BEAM / BTBB | uniswap_v2 | 0x381b...661a | 0.00305277412941896 |
| BEAM / ETH 1% | uniswap-v4-ethereum | 0x9590...b9c2 | 0.003057814556202 |
| BEAM / EVT | pancakeswap_ethereum | 0x3cde...b76f | 0.00320705107897871 |
| BEAM / WETH | x7-finance | 0x5ede...d52e | 0.007140499011 |
| BEAM / KABOSU | uniswap_v2 | 0xfc8c...d352 | 0.002892335379 |
| BEAM / ETH 0.05% | uniswap-v4-ethereum | 0x40a9...7488 | 0.008722379908 |
| BEAM / WBTC 1% | uniswap-v4-ethereum | 0xeca0...4e79 | 0.008591721109 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.