| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| RADIO / WETH | radioshack_ethereum | 0x2a79...7516 | 0.00004204925977 |
| RADIO / USDC | radioshack_ethereum | 0xc19c...83f5 | 0.00004247854795 |
| RADIO / USV | radioshack_ethereum | 0x2413...85e1 | 0.00004184328384 |
| BUILD / RADIO | radioshack_ethereum | 0x44b5...9897 | 0.0000420626633620686 |
| iEUROS / RADIO | radioshack_ethereum | 0x33d6...fb45 | 0.00092218276456235790672819584815327279462760165853816882656124323880740347540107989212926549 |
| iUSDS / RADIO | radioshack_ethereum | 0x688a...43a3 | 0.0006457103719181149572521802036376222450030876755847119416674411515554706553602529022619482 |
| KS / RADIO | radioshack_ethereum | 0xe304...3a93 | 0.001198306239870660593942911817189816303611850073746016341504908949471502928490112549783967328 |
| SPICE / RADIO | radioshack_ethereum | 0x994f...8c8d | 0.00004288981125 |
| USDS / RADIO | radioshack_ethereum | 0x4c55...72bf | 0.0000449025713024074 |
| RADIO / GCME | radioshack_ethereum | 0xbab1...12d9 | 0.000418569020448196 |
| EUROS / RADIO | radioshack_ethereum | 0x990e...8eba | 0.00005923925302 |
| SHACK / RADIO | radioshack_ethereum | 0x6529...8fb8 | 0.0000433521288267348 |
| RADIO / SPWN | radioshack_ethereum | 0x2959...9c70 | 0.00004386500421 |
| RADIO / bECH | radioshack_ethereum | 0xb628...3670 | 0.00005374431857 |
| RADIO / PAWTH | radioshack_ethereum | 0x54a0...e726 | 0.00004384996444 |
| RADIO / FLOKI | radioshack_ethereum | 0x3cd8...64ba | 0.00004548186665 |
| ELK / RADIO | radioshack_ethereum | 0xa2b6...9ebb | 0.0000438650042054435 |
| RADIO / DC | radioshack_ethereum | 0xde74...9473 | 0.00005390685547 |
| RADIO / ELK | elk_finance_ethereum | 0xf71b...83a2 | 0.000048181855338547 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.