| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| OKB / ETH 1% | uniswap-v4-ethereum | 0x5420...f93a | 84.5860646516 |
| OKB / USDT 1% | uniswap_v3 | 0x6368...0090 | 86.0029861035 |
| OKB / WETH 1% | uniswap_v3 | 0xf3d1...7e8f | 84.5377137072 |
| OKB / USDK | uniswap_v2 | 0x6b80...2b4a | 83.8095249607 |
| OKB / ZIK 1% | uniswap-v4-ethereum | 0x69b2...bada | 86.9440057676 |
| OKB / WETH | uniswap_v2 | 0x1778...62fc | 85.9909417929 |
| OKB / TrumpBucks 1% | uniswap-v4-ethereum | 0xd407...9e3a | 84.0176411627 |
| TOM3 / OKB 0.3% | uniswap_v3 | 0x5576...0053 | 85.0122293040501 |
| OKB / USDT 50% | uniswap-v4-ethereum | 0x8983...7a98 | 134.4859845077 |
| OKB / ZIK 0.05% | uniswap-v4-ethereum | 0xfe4c...4001 | 82.7687718022 |
| OKB / USDC 2.5% | uniswap-v4-ethereum | 0x34ea...4e94 | 137.8589713285 |
| OKB / ZIK 0.3% | uniswap-v4-ethereum | 0x00ed...3c4f | 102.0029087956 |
| OKB / USDT 5% | uniswap-v4-ethereum | 0x727a...0783 | 240.36362952 |
| OKB / USDC 3% | uniswap-v4-ethereum | 0xba55...6b98 | 49.1171676197 |
| OKB / ETH 40% | uniswap-v4-ethereum | 0x4846...ab83 | 100.9718716345 |
| OKB / USDC 1.5% | uniswap-v4-ethereum | 0xed2c...361b | 119.2263964023 |
| OKB / USDT 1.01% | uniswap-v4-ethereum | 0x272e...f002 | 126.053452187 |
| OKB / USDT 1% | uniswap-v4-ethereum | 0xbad4...8b97 | 193.1327747853 |
| LAWAS / OKB 0.01% | pancakeswap-v3-ethereum | 0xe6e4...0941 | 84.6614589775761 |
| USDK / OKB | sushiswap | 0x6633...3b50 | 84.7541820503714 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.