| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| OKB / USDT 1% | uniswap_v3 | 0x6368...0090 | 106.456463464808 |
| OKB / ETH 1% | uniswap-v4-ethereum | 0x5420...f93a | 104.732475271851 |
| OKB / WETH 1% | uniswap_v3 | 0xf3d1...7e8f | 104.539014475091 |
| OKB / WETH | uniswap_v2 | 0x1778...62fc | 105.404096002719 |
| OKB / ZIK 1% | uniswap-v4-ethereum | 0x69b2...bada | 105.21429808271 |
| OKB / USDK | uniswap_v2 | 0x6b80...2b4a | 105.384203522921 |
| TOM3 / OKB 0.3% | uniswap_v3 | 0x5576...0053 | 104.700355137243 |
| OKB / USDT 50% | uniswap-v4-ethereum | 0x8983...7a98 | 90.8972688102 |
| OKB / USDC 2.5% | uniswap-v4-ethereum | 0x34ea...4e94 | 136.8811971414 |
| OKB / USDT 5% | uniswap-v4-ethereum | 0x727a...0783 | 240.36362952 |
| OKB / USDC 3% | uniswap-v4-ethereum | 0xba55...6b98 | 49.1171676197 |
| OKB / USDC 0.8% | uniswap-v4-ethereum | 0xd9fb...6078 | 186.2341295448 |
| OKB / ETH 40% | uniswap-v4-ethereum | 0x4846...ab83 | 435.1244314214 |
| OKB / USDC 1.5% | uniswap-v4-ethereum | 0xed2c...361b | 119.2263964023 |
| OKB / USDT 1.01% | uniswap-v4-ethereum | 0x272e...f002 | 126.053452187 |
| OKB / USDT 1% | uniswap-v4-ethereum | 0xbad4...8b97 | 193.1327747853 |
| USDK / OKB | sushiswap | 0x6633...3b50 | 103.65495890458 |
| OKB / USDT 2% | uniswap-v4-ethereum | 0x6762...870b | 271.477206353 |
| OKB / USDC 6% | uniswap-v4-ethereum | 0xeb50...b618 | 292.4947587624 |
| OKB / USDC 5% | uniswap-v4-ethereum | 0x4a6c...f72f | 110.3641841426 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.