| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| PAPER / WETH 1% | uniswap_v3 | 0xad6d...c483 | 0.001037724781 |
| PAPER / WETH | uniswap_v2 | 0x811f...7053 | 0.0001757914524 |
| PAPER / USDT 1% | uniswap_v3 | 0x5cdb...2f17 | 0.006875382725 |
| PAPER / WETH 0.3% | uniswap_v3 | 0x68fd...70e6 | 0.00475595481609984 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.