| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ASH / ETH 1% | uniswap-v4-ethereum | 0x9544...71d6 | 0.00003663615403 |
| ASH / ETH | uniswap-v4-ethereum | 0xd83f...ccb7 | 0.0002034353889 |
| ASH / ETH 0.3% | uniswap-v4-ethereum | 0x112e...81a8 | 0.00003455879523 |
| ASH / USDC 29% | uniswap-v4-ethereum | 0xa469...a734 | 0.00003738289909 |
| ASH / ETH 55% | uniswap-v4-ethereum | 0xc91e...a109 | 0.0001186635291 |
| ASH / USDC 50% | uniswap-v4-ethereum | 0x9e5e...0722 | 0.00002787240159 |
| ASH / USDT 30% | uniswap-v4-ethereum | 0x926f...f63a | 0.00003890260696 |
| ASH / ETH 66% | uniswap-v4-ethereum | 0xcfd4...13a9 | 0.00003440291754 |
| ASH / ETH | uniswap-v4-ethereum | 0x6dbe...1b03 | 0.0002033040183 |
| ASH / USDT 31% | uniswap-v4-ethereum | 0x75e1...3beb | 0.00003931259749 |
| ASH / ETH | uniswap-v4-ethereum | 0xc227...901a | 0.0002003831568 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.