| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| VOLT / DRAGONX 1% | uniswap_v3 | 0xb01c...76d4 | 0.0002184218986 |
| LOTUS / VOLT 1% | uniswap_v3 | 0x15a1...e939 | 0.000218573753419356 |
| VYPER / VOLT 1% | uniswap_v3 | 0xbf0c...1a4b | 0.000200363351668267 |
| VOLT / SHOGUN | uniswap_v2 | 0xf0b1...5394 | 0.0002037536051 |
| EDEN / VOLT 1% | uniswap_v3 | 0x23c1...17ac | 0.0003762073801 |
| VOLT / ELMNT | uniswap_v2 | 0xe942...5b60 | 0.0002253175532 |
| VOLT / WETH | dodo-pmm-ethereum | 0xe4c2...14b7 | 0.0001814124413 |
| VOLT / JAKEX 1% | uniswap_v3 | 0xd731...700f | 0.0002824895042 |
| VOLT / WETH 1% | uniswap_v3 | 0x238c...e8eb | 0.002110024708 |
| VOLT / LGNDX 1% | uniswap_v3 | 0x9e99...af35 | 0.0002840993371 |
| VOLT / AWX 1% | uniswap-v4-ethereum | 0x5507...645f | 0.002910606553 |
| VOLT / HYDRA 1% | uniswap_v3 | 0x8dc4...2c42 | 0.000304735326 |
| VOLT / HYPER 1% | uniswap_v3 | 0x6a9c...3bdd | 0.002538250253 |
| INF / VOLT 1% | uniswap_v3 | 0xec35...ceb9 | 0.02962324411 |
| VOLT / FLUX 1% | uniswap_v3 | 0x9394...9d80 | 0.03203121547 |
| VOLT / AWX 1% | uniswap_v3 | 0x33eb...deae | 0.0278438784 |
| TURBO / VOLT 1% | uniswap_v3 | 0x97e5...8a04 | 0.002493668744 |
| VOLT / AWX 0.3% | uniswap_v3 | 0x37cf...7e46 | 0.002655959467 |
| VOLT / BDX 1% | uniswap_v3 | 0x7cbf...7bb1 | 0.03174298107 |
| HLX / VOLT 1% | uniswap_v3 | 0x9e14...2db8 | 0.0391362718 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.