| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| MATT / WETH | uniswap_v2 | 0x3bf0...e5e8 | 0.0000003156149541 |
| MATT / TrumpBucks 1% | uniswap-v4-ethereum | 0x844f...003c | 0.0000003079717537 |
| MATT / WETH 0.3% | uniswap_v3 | 0x852c...390c | 0.000000307408367 |
| MATT / WETH 1% | uniswap_v3 | 0x1a4f...8a66 | 0.00000778818774713746 |
| MATT / pepecoin 1% | uniswap_v3 | 0x71ce...a90b | 0.0000229078451281457 |
| BOYS / MATT 1% | uniswap_v3 | 0x8885...421c | 0.000004319373176 |
| PEIPEI / MATT 1% | uniswap_v3 | 0x7c27...c6e2 | 0.0000273314954134551 |
| MATT / TrumpBucks | uniswap_v2 | 0x61a7...4b1f | 0.0000008205447193 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.