| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ANKR / ETH 0.3% | uniswap-v4-ethereum | 0x7a2b...15fc | 0.00620447364952848 |
| ANKR / WETH 0.3% | uniswap_v3 | 0x13dc...4c0d | 0.00618736900242369 |
| ANKR / WETH | uniswap_v2 | 0x5201...3fa9 | 0.00620630944045235 |
| ANKR / WETH | sushiswap | 0x1241...131e | 0.00623173445590795 |
| ANKR / USDC 88% | uniswap-v4-ethereum | 0xcc30...c73c | 0.00215610595 |
| ANKR / LINK 0.3% | uniswap-v4-ethereum | 0xc91c...074d | 0.007536532118 |
| ANKR / aETHc | sushiswap | 0xe558...d5ba | 0.0066393029240129 |
| BUSD / ANKR 1% | uniswap_v3 | 0x5431...e101 | 0.007097597125 |
| ANKR / WETH 1% | pancakeswap-v3-ethereum | 0x0d59...5f2c | 0.01057571295 |
| ANKR / KABOSU | uniswap_v2 | 0x3e52...7b07 | 0.006644193876 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.