| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| BTR / USDT 2.9% | uniswap-v4-ethereum | 0x7af0...054c | 0.02608608248 |
| BTR / USDT 2.789% | uniswap-v4-ethereum | 0xf3e3...fcd9 | 0.02618845798 |
| BTR / USDT 70% | uniswap-v4-ethereum | 0x5c45...4735 | 0.08031843037 |
| BTR / USDT 10% | uniswap-v4-ethereum | 0x6491...25ff | 0.03854357458 |
| BTR / USDT 19% | uniswap-v4-ethereum | 0xe7ed...4462 | 0.1113882162 |
| BTR / USDT 70.02% | uniswap-v4-ethereum | 0x808e...d5ea | 0.0234622799 |
| BTR / USDC 95.3% | uniswap-v4-ethereum | 0xfe79...84af | 0.01567928479 |
| BTR / USDC 5% | uniswap-v4-ethereum | 0x5757...551e | 0.07293470228 |
| BTR / USDT 70.01% | uniswap-v4-ethereum | 0xbd40...65ce | 0.02570230668 |
| BTR / USDC 95.1% | uniswap-v4-ethereum | 0xb614...bc87 | 0.01541227257 |
| BTR / USDT 5% | uniswap-v4-ethereum | 0x0538...af38 | 0.03291794409 |
| BTR / USDC 15.95% | uniswap-v4-ethereum | 0x111f...03de | 0.1658930641 |
| BTR / USDT 2.999% | uniswap-v4-ethereum | 0x9558...6062 | 0.05624018878 |
| BTR / USDT 9% | uniswap-v4-ethereum | 0xe7f1...bd04 | 0.1158226642 |
| BTR / USDT 4% | uniswap-v4-ethereum | 0x748f...0234 | 0.1407899074 |
| BTR / USDC 50% | uniswap-v4-ethereum | 0x9063...953c | 0.121371113 |
| BTR / USDT 20% | uniswap-v4-ethereum | 0xc790...18cc | 0.08841158887 |
| BTR / USDT 6% | uniswap-v4-ethereum | 0x527b...b5f4 | 0.1193389347 |
| BTR / USDC 16.85% | uniswap-v4-ethereum | 0x26df...b6e8 | 0.1357997948 |
| BTR / USDT 3% | uniswap-v4-ethereum | 0x5326...70d3 | 0.07967164109 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.