| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| TrumpBucks / ETH 1% | uniswap-v4-ethereum | 0xf682...cfcf | 0.0003032570677 |
| TrumpBucks / USDC 1% | uniswap-v4-ethereum | 0xfebf...cc4b | 0.0003071768296 |
| TrumpBucks / SLACK | uniswap_v2 | 0x4691...69d3 | 0.0003235326447 |
| TrumpBucks / SLACK 1% | uniswap-v4-ethereum | 0x88eb...1b9e | 0.0003107879052 |
| TrumpBucks / CRV 1% | uniswap-v4-ethereum | 0x8c00...7b19 | 0.0003084471372 |
| PAXG / TrumpBucks 1% | uniswap-v4-ethereum | 0x51c3...8cd9 | 0.000303807915094068 |
| wTAO / TrumpBucks 1% | uniswap-v4-ethereum | 0xfdc8...06db | 0.000303416646795182 |
| TrumpBucks / ODIN 1% | uniswap-v4-ethereum | 0x875b...17a8 | 0.0003161603724 |
| TrumpBucks / SLVon 1% | uniswap-v4-ethereum | 0x9101...be7a | 0.0003235055538 |
| ENSO / TrumpBucks 1% | uniswap-v4-ethereum | 0xfcb8...6949 | 0.000304759175396355 |
| TrumpBucks / DRV 1% | uniswap-v4-ethereum | 0x36a5...6598 | 0.0003017444322 |
| CVX / TrumpBucks 1% | uniswap-v4-ethereum | 0xab6b...d265 | 0.000304581926848767 |
| TrumpBucks / PEPE 0.01% | uniswap-v4-ethereum | 0x58c8...9362 | 0.0003045831874 |
| TrumpBucks / SKOL 1% | uniswap-v4-ethereum | 0xd03c...c9cf | 0.0003061267478 |
| TrumpBucks / FET 1% | uniswap-v4-ethereum | 0x02eb...2ca2 | 0.00030533297 |
| TrumpBucks / RIO 1% | uniswap-v4-ethereum | 0x09b4...e636 | 0.000304253018 |
| TrumpBucks / WBTC 1% | uniswap-v4-ethereum | 0x3fca...4484 | 0.0003096540556 |
| TrumpBucks / SKOL | uniswap_v2 | 0xc56d...a837 | 0.0003040940263 |
| WISE / TrumpBucks 1% | uniswap-v4-ethereum | 0xc54f...edd9 | 0.000300034934430924 |
| OM / TrumpBucks 1% | uniswap-v4-ethereum | 0xbbce...5270 | 0.000304583187376457 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.