| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| TrumpBucks / ETH 1% | uniswap-v4-ethereum | 0xf682...cfcf | 0.000855977168446034 |
| TrumpBucks / SLACK 1% | uniswap-v4-ethereum | 0x88eb...1b9e | 0.000838036827456961 |
| TrumpBucks / SLACK | uniswap_v2 | 0x4691...69d3 | 0.00085575775031044 |
| TrumpBucks / SKOL 1% | uniswap-v4-ethereum | 0xd03c...c9cf | 0.000841082232867372 |
| TrumpBucks / PEPE 0.01% | uniswap-v4-ethereum | 0x58c8...9362 | 0.000841237209906646 |
| TrumpBucks / SPX 1% | uniswap-v4-ethereum | 0xb7df...33f6 | 0.000847774016237022 |
| TrumpBucks / ODIN 1% | uniswap-v4-ethereum | 0x875b...17a8 | 0.000844405317387911 |
| TrumpBucks / SKOL | uniswap_v2 | 0xc56d...a837 | 0.000844830312921953 |
| TrumpBucks / CRV 1% | uniswap-v4-ethereum | 0x8c00...7b19 | 0.000828035725782277 |
| DorkLord / TrumpBucks 1% | uniswap-v4-ethereum | 0x286e...21a0 | 0.000838036827456961 |
| LICKER / TrumpBucks 1% | uniswap-v4-ethereum | 0xab85...73ba | 0.000841237209906646 |
| TrumpBucks / RIBBIT 1% | uniswap-v4-ethereum | 0x6b18...8f98 | 0.000838036827456961 |
| TrumpBucks / RAIL 1% | uniswap-v4-ethereum | 0xabbe...113e | 0.000841876210321356 |
| CABAL / TrumpBucks 1% | uniswap-v4-ethereum | 0x8bfe...2fbd | 0.000841082232867372 |
| MATT / TrumpBucks 1% | uniswap-v4-ethereum | 0x844f...003c | 0.000830278482559725 |
| BoysClub / TrumpBucks 1% | uniswap-v4-ethereum | 0xe368...4858 | 0.000847774016237022 |
| GBTC6900 / TrumpBucks 1% | uniswap-v4-ethereum | 0x2db3...8a8b | 0.00085205684384215 |
| TrumpBucks / HONK 1% | uniswap-v4-ethereum | 0xa4fd...89c5 | 0.000841082232867372 |
| PAXG / TrumpBucks 1% | uniswap-v4-ethereum | 0x51c3...8cd9 | 0.000842025468941382 |
| BABYPEPE / TrumpBucks 1% | uniswap-v4-ethereum | 0x065c...8d04 | 0.000844399870181114 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.