| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| TURTLE / ETH 4% | uniswap-v4-ethereum | 0x4d99...f2d3 | 0.0667106143631734 |
| TURTLE / ETH 50% | uniswap-v4-ethereum | 0x26ff...1360 | 0.0638620844233998 |
| TURTLE / USDC 5% | uniswap-v4-ethereum | 0xdc18...5303 | 0.1665233873 |
| TURTLE / USDC 2% | uniswap-v4-ethereum | 0x9a72...541f | 0.1963069815 |
| TURTLE / USDT 1% | uniswap-v4-ethereum | 0x3630...7e26 | 0.2431332675 |
| TURTLE / USDT 2% | uniswap-v4-ethereum | 0xaa44...3b0c | 0.2659145793 |
| TURTLE / ETH 5% | uniswap-v4-ethereum | 0x747a...7f79 | 0.2851060569 |
| TURTLE / USDC 4.99% | uniswap-v4-ethereum | 0xa332...0977 | 0.273573446 |
| TURTLE / USDT 5% | uniswap-v4-ethereum | 0x8bef...f243 | 0.2432548418 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.