| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| LILPEPE / WETH | uniswap_v2 | 0xaa14...7f8d | 0.0124508999 |
| LILPEPE / WETH | dodo-pmm-ethereum | 0xa4c1...09d1 | 0.00225653992 |
| LILPEPE / USDC | uniswap_v2 | 0x6535...655f | 0.008921315666 |
| LILPEPE / WETH | dodo-pmm-ethereum | 0xf4d9...3f57 | 0.001966802369 |
| LILPEPE / WETH | dodo-pmm-ethereum | 0xac3b...a433 | 0.02059001926 |
| LILPEPE / WETH | dodo-pmm-ethereum | 0x647a...d887 | 0.004601787578 |
| LILPEPE / WETH | dodo-pmm-ethereum | 0x0759...713e | 0.01707252629 |
| LILPEPE / WBTC | uniswap_v2 | 0x949d...2b30 | 0.00606757379 |
| LILPEPE / WETH | dodo-pmm-ethereum | 0xc070...880a | 0.01234279107 |
| LILPEPE / DAI | uniswap_v2 | 0x0929...d044 | 0.002570278796 |
| LILPEPE / USDT | uniswap_v2 | 0x87d3...f64b | 0.009699475722 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.