| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| DANKDOGE / WETH | uniswap_v2 | 0xca4b...f732 | 0.000000004655934246 |
| DANKDOGE / USDC 4% | uniswap-v4-ethereum | 0x1d39...d252 | 0.000000004365046108 |
| DANKDOGE / USDC 4.5% | uniswap-v4-ethereum | 0x96cd...f2e6 | 0.000000001938611386 |
| DANKDOGE / USDC 10% | uniswap-v4-ethereum | 0xbfe9...6960 | 0.000000002073255393 |
| DANKDOGE / ETH 10% | uniswap-v4-ethereum | 0x058b...5560 | 0.000000004303349718 |
| DANKDOGE / USDC 3.99% | uniswap-v4-ethereum | 0x1f3e...bad4 | 0.000000001732145763 |
| DANKDOGE / ETH 7% | uniswap-v4-ethereum | 0x8726...ac39 | 0.000000002365483388 |
| DANKDOGE / USDC 3.97% | uniswap-v4-ethereum | 0xd7fe...9a35 | 0.000000002748304935 |
| DANKDOGE / ETH 5% | uniswap-v4-ethereum | 0xf447...dec1 | 0.000000004476371375 |
| DANKDOGE / ETH 9% | uniswap-v4-ethereum | 0x5d71...a3d5 | 0.000000002749400444 |
| DANKDOGE / ETH 4% | uniswap-v4-ethereum | 0x97f7...116c | 0.000000005898608727 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.