| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| CSR / USDC 45% | uniswap-v4-ethereum | 0x20ff...59a9 | 0.003315488536 |
| CSR / USDC 15% | uniswap-v4-ethereum | 0xe2ef...15b5 | 0.004428124328 |
| CSR / USDC 1% | uniswap-v4-ethereum | 0x536f...4bea | 0.002522679665 |
| CSR / USDC 99.3% | uniswap-v4-ethereum | 0xea9b...bb66 | 0.00006449341726 |
| CSR / USDC 99.2% | uniswap-v4-ethereum | 0x4a20...adfa | 0.00007775650725 |
| CSR / USDC 99.3% | uniswap-v4-ethereum | 0xb01c...62f0 | 0.00007887326162 |
| CSR25 / CSR 1% | uniswap-v4-ethereum | 0x689c...2110 | 0.0006775062946 |
| CSR / USDC 99.301% | uniswap-v4-ethereum | 0xac4d...31e7 | 0.0000187104404 |
| CSR / USDT 0.3% | uniswap-v4-ethereum | 0x6c76...7f9e | 0.00166231974 |
| CSR / ETH 90% | uniswap-v4-ethereum | 0x079d...150e | 0.000000001470648417 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.