| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| UBT / WETH | uniswap_v2 | 0xb27d...f5ba | 0.0352822398985213 |
| UBT / WETH 1% | uniswap_v3 | 0xf9d2...0bda | 0.0352956706298753 |
| UBT / ETH 1% | uniswap-v4-ethereum | 0x0d5e...72ce | 0.084522743 |
| UBT / WETH 0.3% | uniswap_v3 | 0xdd5a...0ead | 0.4999442074 |
| UBT / LINK | uniswap_v2 | 0x3f7b...7a94 | 0.03658151012 |
| BNT / UBT | carbon-defi-ethereum | 0xc537...2101 | 0.04015424473 |
| RPL / UBT | uniswap_v2 | 0x1411...4a3b | 0.04084703084 |
| PRVD / UBT 1% | uniswap_v3 | 0x6abb...8a23 | 0.0826771753447213 |
| UBT / WETH | sushiswap | 0x1c8d...e93e | 0.04128045977 |
| UBT / USDC 1% | uniswap_v3 | 0xc1a2...567a | 0.04991182532 |
| UBT / MNW 1% | uniswap_v3 | 0xae7d...e7cd | 0.01332545815 |
| ICNQ / UBT | uniswap_v2 | 0xb480...d855 | 0.079310096008393 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.