| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| OKB / ETH 1% | uniswap-v4-ethereum | 0x5420...f93a | 81.6980188567282 |
| OKB / USDT 1% | uniswap_v3 | 0x6368...0090 | 81.812027405156 |
| OKB / WETH 1% | uniswap_v3 | 0xf3d1...7e8f | 81.0631487816036 |
| OKB / ZIK 0.05% | uniswap-v4-ethereum | 0xfe4c...4001 | 85.2493873937475 |
| OKB / USDK | uniswap_v2 | 0x6b80...2b4a | 83.6718433670212 |
| OKB / WETH | uniswap_v2 | 0x1778...62fc | 83.754960251498 |
| OKB / ZIK 0.3% | uniswap-v4-ethereum | 0x00ed...3c4f | 85.1981898642132 |
| OKB / ZIK 1% | uniswap-v4-ethereum | 0x69b2...bada | 86.7153424196295 |
| USDK / OKB | sushiswap | 0x6633...3b50 | 83.6718433670212 |
| OKB / USDT 50% | uniswap-v4-ethereum | 0x8983...7a98 | 131.7320269693 |
| OKB / USDC 2.5% | uniswap-v4-ethereum | 0x34ea...4e94 | 136.8811971414 |
| OKB / USDT 5% | uniswap-v4-ethereum | 0x727a...0783 | 240.36362952 |
| OKB / USDC 3% | uniswap-v4-ethereum | 0xba55...6b98 | 49.1171676197 |
| TOM3 / OKB 0.3% | uniswap_v3 | 0x5576...0053 | 87.570384525441 |
| OKB / ETH 40% | uniswap-v4-ethereum | 0x4846...ab83 | 90.669142595 |
| OKB / USDC 1.5% | uniswap-v4-ethereum | 0xed2c...361b | 119.2263964023 |
| OKB / USDT 1.01% | uniswap-v4-ethereum | 0x272e...f002 | 126.053452187 |
| OKB / USDT 1% | uniswap-v4-ethereum | 0xbad4...8b97 | 193.1327747853 |
| OKB / USDT 2% | uniswap-v4-ethereum | 0x6762...870b | 271.477206353 |
| OKB / USDC 6% | uniswap-v4-ethereum | 0xeb50...b618 | 292.4947587624 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.