| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| BURN / WETH | uniswap_v2 | 0x18f7...494b | 0.000001614000499 |
| BURN / SHIB | sushiswap | 0x2584...523a | 0.000001610344055 |
| BURN / WETH | sushiswap | 0x5b3f...d096 | 0.000001517483675 |
| BURN / LUNA | sushiswap | 0x9b6a...08b3 | 0.000001589928374 |
| BURN / ALICE | uniswap_v2 | 0x7020...68bb | 0.000001583728846 |
| BURN / SOL | sushiswap | 0x5fa5...0f83 | 0.000001509764325 |
| PEPE / BURN | uniswap_v2 | 0x6f8f...3af8 | 0.000001688660193 |
| BURN / UNI | sushiswap | 0x4e73...63e2 | 0.000001695131748 |
| BURN / SUSHI | sushiswap | 0x489a...794c | 0.00000170250364 |
| BURN / DSync | uniswap_v2 | 0xa2c0...b826 | 0.000001701659446 |
| NEURAL / BURN | uniswap_v2 | 0xa1ce...b197 | 0.00000170032053591767 |
| BURN / WETH | shibaswap | 0x4f22...a94c | 0.000003190896426 |
| BURN / ILV | sushiswap | 0xd649...9545 | 0.000003093834186 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.