| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| T / DAI 1% | uniswap_v3 | 0x1f8c...1ef6 | 0.324906583449744 |
| TINU / T | uniswap_v2 | 0xe602...2dbe | 0.278749111646901025445573340220771768410631292247191033416989443217141826799338559839030428 |
| TITAN / T | uniswap_v2 | 0x1865...78df | 0.08624794194854856609554935350642804466818023345877801828796203015587807378614392582499047056138099503768 |
| T / 3Crv | curve | 0xa77d...becd | 0.000747741894408761 |
| T / DAI | uniswap_v2 | 0x5d3f...c6f6 | 0.0007763974191 |
| T / USDT 1% | uniswap_v3 | 0xffa0...6fce | 0.000001542090652869997466776345375764238654693676559078103505222016 |
| T / USDC 0.01% | uniswap_v3 | 0x2f93...4431 | 0.257108778121827 |
| MR / T 1% | uniswap_v3 | 0xce4a...2760 | 0.04248611127443814560957664546864329814863592448 |
| MR / T | uniswap_v2 | 0x7490...9adb | 0.04663071462363351867744371148744377606106656335443690035109597344393764393227711778168610915426064568 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.