| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| EVZ / ETH 97% | uniswap-v4-ethereum | 0x3c60...fbe5 | 0.001792568074 |
| EVZ / ETH 90.5% | uniswap-v4-ethereum | 0x30d4...d15d | 0.0002200253175 |
| EVZ / ETH 95% | uniswap-v4-ethereum | 0x8fe9...7d8a | 0.0001409398274 |
| EVZ / WETH | uniswap_v2 | 0x677d...c34f | 0.002591927926 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.