| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| DC / WETH 1% | uniswap_v3 | 0x4984...1ec5 | 0.00002222461818 |
| DC / WETH | uniswap_v2 | 0x8a63...8a32 | 0.00002191878104 |
| DC / WETH | dodo-pmm-ethereum | 0x32d0...1c35 | 0.00002163819139 |
| DC / WETH | dodo-pmm-ethereum | 0xf5ca...973b | 0.00002217799816 |
| BARK / DC 1% | uniswap_v3 | 0x300e...0c5f | 0.00178698085610143040449505040327 |
| DC / DCFC 1% | uniswap_v3 | 0xec27...59fe | 0.00178698085610143040449505040327 |
| DC / ETH 90% | uniswap-v4-ethereum | 0xc78e...2208 | 0.00002190912729 |
| DC / WETH | dodo-pmm-ethereum | 0xf66a...ada0 | 0.00001859700121 |
| KC / DC 1% | uniswap_v3 | 0x5526...43bf | 0.001139494557904438523030873190469 |
| DC / USDT 1% | uniswap_v3 | 0x8b49...d19e | 0.00198754182 |
| DC / WETH | sushiswap | 0x49b1...2d8b | 0.00002122368754 |
| RADIO / DC | radioshack_ethereum | 0xde74...9473 | 0.00003067596759 |
| KC / DC | sushiswap | 0xcd92...84ab | 0.001141284530739460179207106002820427862348755551095684475735620322650140801331102031571501065 |
| DC / USDC 1% | uniswap_v3 | 0xb9f9...1498 | 0.001562769194925003896379854999316 |
| DC / WETH 0.3% | uniswap_v3 | 0xee14...efd9 | 0.00134136256059054 |
| DMD / DC | uniswap_v2 | 0xdaf8...4c34 | 0.00159117061337216031076087468047314232805558777306063488441704351995938233657054762553062232 |
| SEND / DC 1% | uniswap_v3 | 0x9dd9...0101 | 0.00159132991938879830239711415616 |
| DC / USDC | uniswap_v2 | 0x8db7...d811 | 0.0017902582919291051293393547432479156258821304376453156270535214014079430892413583991229652 |
| DC / DAI 1% | uniswap_v3 | 0x568f...c97e | 0.00182330992039462294409292688008 |
| BEEP / DC | uniswap_v2 | 0x1e06...31b7 | 0.00097556872011812175707937179431244667341191399345024491528786444987611553499104276618681424 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.