| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| kek / WETH | uniswap_v2 | 0x6b42...3598 | 0.000000000229623840084668 |
| kek / ETH 0.5% | uniswap-v4-ethereum | 0xe551...7377 | 0.0000000002796089515 |
| kek / ETH 2% | uniswap-v4-ethereum | 0xbb38...e38f | 0.000000002055138346 |
| kek / ETH 0.25% | uniswap-v4-ethereum | 0x4bfd...a2eb | 0.00000001374927504 |
| kek / ETH 1.25% | uniswap-v4-ethereum | 0x2c26...7b7f | 0.00000000909610143 |
| kek / ETH 1% | uniswap-v4-ethereum | 0xd005...048d | 0.0000000002157227952 |
| kek / ETH 10% | uniswap-v4-ethereum | 0x4e1b...aa3c | 0.0000000019310159 |
| kek / ETH 1.5% | uniswap-v4-ethereum | 0x9db5...cc1c | 0.000000008701583484 |
| kek / ETH 0.3% | uniswap-v4-ethereum | 0x0655...aaa6 | 0.000000005288825182 |
| kek / ETH 0.7% | uniswap-v4-ethereum | 0xb1bb...809c | 0.000000007648242831 |
| kek / ETH 0.8% | uniswap-v4-ethereum | 0xb1c2...4f30 | 0.000000007294449185 |
| kek / KABOSU | uniswap_v2 | 0xa5c9...b8af | 0.000000000222892734238545 |
| kek / ETH 0.65% | uniswap-v4-ethereum | 0x1309...4808 | 0.00000000876786706 |
| kek / ETH 0.486% | uniswap-v4-ethereum | 0xdef7...a93b | 0.000000001649030532 |
| kek / ETH 0.05% | uniswap-v4-ethereum | 0x6bc8...2cdf | 0.00000000776848428 |
| kek / ETH 0.15% | uniswap-v4-ethereum | 0x3484...2cea | 0.000000009030929323 |
| kek / ETH 0.09% | uniswap-v4-ethereum | 0xfdb0...26ac | 0.000000006552471523 |
| kek / ETH 0.023% | uniswap-v4-ethereum | 0xa331...68c8 | 0.000000001360812141 |
| kek / ETH 0.015% | uniswap-v4-ethereum | 0x40b7...7047 | 0.000000004577498466 |
| kek / ETH 0.12% | uniswap-v4-ethereum | 0xd6f1...65a4 | 0.000000004810737557 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.