| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| PHA / WETH | uniswap_v2 | 0x8867...e61e | 0.0352053150895553 |
| PHA / WETH 1% | uniswap_v3 | 0x7bc5...bc53 | 0.0351916960069761 |
| PHA / KABOSU | uniswap_v2 | 0xeaf6...3da4 | 0.0353181607893094 |
| vPHA / PHA 1% | uniswap-v4-ethereum | 0xe9fb...dd63 | 0.0343931570128237 |
| CCDAO / PHA 1% | uniswap_v3 | 0x4f91...edc6 | 0.03479182931 |
| vPHA / PHA 0.3% | uniswap_v3 | 0x7977...7229 | 0.1084111094 |
| PHA / ABDS 1% | pancakeswap-v3-ethereum | 0x7378...bdfb | 0.0344212413365627 |
| PHA / ABDS 0.3% | uniswap-v4-ethereum | 0x5f3d...aef1 | 0.04105732833 |
| PHA / EVT | pancakeswap_ethereum | 0x693f...72df | 0.0396334559 |
| PHA / USDT 0.3% | uniswap_v3 | 0x4797...a813 | 0.2546169483 |
| PHA / ABDS 1% | uniswap_v3 | 0x3c18...eb4c | 0.1588893119 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.