| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| GAS / WETH | sushiswap | 0x7f7d...a87a | 0.000000098006320316836 |
| GAS / WETH | uniswap_v2 | 0x65a3...7962 | 0.0000000991484645889144 |
| GAS / WETH 1% | uniswap_v3 | 0xe297...f23a | 0.000000112899898456037 |
| GAS / ETP | uniswap_v2 | 0x1dda...8aef | 0.00000009041655292 |
| GAS / USDC | sushiswap | 0xde71...9487 | 0.0000002074770052 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.