| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| BURN / WETH | uniswap_v2 | 0x18f7...494b | 0.00000332497370451222 |
| PEPE / BURN | uniswap_v2 | 0x6f8f...3af8 | 0.00000332664793278206 |
| BURN / LUNA | sushiswap | 0x9b6a...08b3 | 0.00000345024538333278 |
| BURN / WETH | sushiswap | 0x5b3f...d096 | 0.00000331281144840684 |
| NEURAL / BURN | uniswap_v2 | 0xa1ce...b197 | 0.00000329477183187393 |
| BURN / SHIB | sushiswap | 0x2584...523a | 0.00000349244606326749 |
| BURN / ALICE | uniswap_v2 | 0x7020...68bb | 0.00000341170361832689 |
| BURN / SOL | sushiswap | 0x5fa5...0f83 | 0.000003202737836 |
| BURN / UNI | sushiswap | 0x4e73...63e2 | 0.00000317346191373197 |
| BURN / SUSHI | sushiswap | 0x489a...794c | 0.000003256843444 |
| BURN / DSync | uniswap_v2 | 0xa2c0...b826 | 0.00000342133701570703 |
| BURN / WETH | shibaswap | 0x4f22...a94c | 0.000003190896426 |
| BURN / ILV | sushiswap | 0xd649...9545 | 0.000003093834186 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.