| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| OHM / EEFI | uniswap_v2 | 0x79fe...1da8 | 17.4636786269927 |
| EEFI / WETH 1% | uniswap_v3 | 0x2365...e5fe | 17.197306108883 |
| EEFI / SPOT 1% | uniswap_v3 | 0xb8c5...6b5d | 43.1190468388 |
| EEFI / WAMPL 1% | uniswap_v3 | 0x6f40...6663 | 17.1415795091 |
| EEFI / WETH 0.3% | uniswap_v3 | 0x0b1d...6024 | 371.7241335516 |
| EEFI / USDT | uniswap_v2 | 0x3462...7256 | 150.5658251432 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.