| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| BURN / WETH | uniswap_v2 | 0x18f7...494b | 0.000001459227818 |
| BURN / LUNA | sushiswap | 0x9b6a...08b3 | 0.000001451728687 |
| BURN / WETH | sushiswap | 0x5b3f...d096 | 0.00000144886213 |
| BURN / ALICE | uniswap_v2 | 0x7020...68bb | 0.000001453821706 |
| BURN / SOL | sushiswap | 0x5fa5...0f83 | 0.000001434084543 |
| PEPE / BURN | uniswap_v2 | 0x6f8f...3af8 | 0.00000145172868749937 |
| BURN / SHIB | sushiswap | 0x2584...523a | 0.000001436219646 |
| BURN / UNI | sushiswap | 0x4e73...63e2 | 0.000001358199509 |
| BURN / SUSHI | sushiswap | 0x489a...794c | 0.000001344579733 |
| BURN / DSync | uniswap_v2 | 0xa2c0...b826 | 0.000001375798103 |
| NEURAL / BURN | uniswap_v2 | 0xa1ce...b197 | 0.000001368776652 |
| BURN / WETH | shibaswap | 0x4f22...a94c | 0.000001543325444 |
| BURN / ILV | sushiswap | 0xd649...9545 | 0.000003093834186 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.