| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| STONKS / WETH | uniswap_v2 | 0x2079...7a2e | 0.000000483600613975208 |
| STONKS / ETH 1% | uniswap-v4-ethereum | 0x4aa1...f59b | 0.000001645798411 |
| STONKS / TrumpBucks | uniswap_v2 | 0x0750...8a23 | 0.000000501160157783358 |
| crypto / STONKS 1% | uniswap-v4-ethereum | 0x7c63...5a88 | 0.00001397949368 |
| STONKS / USDC 88% | uniswap-v4-ethereum | 0x3604...867d | 0.0000005275261398 |
| STONKS / USDT 80% | uniswap-v4-ethereum | 0x5a73...6681 | 0.0000005867250925 |
| STONKS / WETH 1% | uniswap_v3 | 0xe274...09e7 | 0.00002230652794 |
| BTBT / STONKS 0.069% | uniswap-v4-ethereum | 0xff55...f1d8 | 0.00002245842315 |
| MAMBO / STONKS 1% | uniswap-v4-ethereum | 0xb7c8...b644 | 0.00001398689848 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.