| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| TRWA / WETH | uniswap_v2 | 0xd984...c3e9 | 0.00107821006405449 |
| TRWA / ZIK 1% | uniswap-v4-ethereum | 0xb779...e5ac | 0.00105669165996852 |
| TRWA / USDT 80% | uniswap-v4-ethereum | 0x3f21...3c9d | 0.00106607482939805 |
| TRWA / ETH 0.3% | uniswap-v4-ethereum | 0x5c35...b17f | 0.01472699933 |
| TRWA / USDT 88% | uniswap-v4-ethereum | 0x1269...ec77 | 0.003064765194 |
| TRWA / USDT 70% | uniswap-v4-ethereum | 0xe87e...cd5e | 0.007462897929 |
| TRWA / WETH 1% | uniswap_v3 | 0xee10...9c05 | 0.009279896148 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.