| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ANKR / ETH 0.3% | uniswap-v4-ethereum | 0x7a2b...15fc | 0.00739182406602422 |
| ANKR / WETH 0.3% | uniswap_v3 | 0x13dc...4c0d | 0.00739036763826416 |
| ANKR / WETH | uniswap_v2 | 0x5201...3fa9 | 0.00737898686114331 |
| ANKR / LINK 0.3% | uniswap-v4-ethereum | 0xc91c...074d | 0.00742889396143944 |
| ANKR / WETH | sushiswap | 0x1241...131e | 0.00737866099200916 |
| ANKR / aETHc | sushiswap | 0xe558...d5ba | 0.00725805507506283 |
| ANKR / KABOSU | uniswap_v2 | 0x3e52...7b07 | 0.00768793087268741 |
| ANKR / WETH 1% | pancakeswap-v3-ethereum | 0x0d59...5f2c | 0.00810985886938288 |
| BUSD / ANKR 1% | uniswap_v3 | 0x5431...e101 | 0.007748006329 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.