| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| LANDWU / WETH | uniswap_v2 | 0xc6c8...908a | 0.000000000185405044966892 |
| LANDWU / WETH 1% | uniswap_v3 | 0xc2a3...80a8 | 0.0000000001800641044 |
| LANDWU / TrumpBucks 1% | uniswap-v4-ethereum | 0xb5e1...0d3f | 0.000000000185879538896513 |
| LANDWU / CABAL | uniswap_v2 | 0x6d8e...0b06 | 0.0000000001856795592 |
| BoysClub / LANDWU | uniswap_v2 | 0x6f36...2c58 | 0.0000000001556215113 |
| LANDWU / HONK | uniswap_v2 | 0xbe56...6ce4 | 0.000000000182302368445009 |
| LANDWU / TrumpBucks | uniswap_v2 | 0x3c32...99ba | 0.000000001501014425 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.