| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| JOE / WETH | uniswap_v2 | 0x704a...b035 | 0.00878048560148422 |
| JOE / triangle | uniswap_v2 | 0x4fcb...307b | 0.00879434261609931 |
| BITCOIN / JOE 1% | uniswap_v3 | 0xee80...0c90 | 0.00890736724862152 |
| JOE / MEME 0.3% | uniswap_v3 | 0x01de...c3a0 | 0.00890736724862152 |
| JOE / WETH 1% | uniswap_v3 | 0xceb6...036e | 0.00922292957673995 |
| JOE / ETH 1% | uniswap-v4-ethereum | 0x01cd...29c9 | 0.03096148829 |
| JOE / ETH 0.3% | uniswap-v4-ethereum | 0x8b26...bfef | 0.01626628787 |
| JOE / USDC 88% | uniswap-v4-ethereum | 0xe679...26a0 | 0.004412983666 |
| JOE / USDS 0.01% | uniswap_v3 | 0x588d...f759 | 0.01143277831 |
| JCD / JOE 1% | uniswap-v4-ethereum | 0xd544...93a5 | 0.05574365546 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.