| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| KEEP / WETH | uniswap_v2 | 0xe6f1...174a | 0.0420522628550628 |
| NU / KEEP 1% | uniswap_v3 | 0xcfc4...3c9d | 0.0425556328532133 |
| TBTC / KEEP | uniswap_v2 | 0x38c8...f081 | 0.0409617457194027 |
| KEEP / USDT 0.3% | uniswap_v3 | 0x8dfc...6d4d | 0.1984181296 |
| KEEP / WETH 0.3% | uniswap_v3 | 0x211d...a011 | 0.2828839728 |
| KEEP / WETH 1% | uniswap_v3 | 0xefe7...c779 | 0.192070763415397 |
| KEEP / USDT | uniswap_v2 | 0x8f19...59b1 | 0.05074571558 |
| KEEP / FARM | uniswap_v2 | 0x7e05...3e24 | 0.183191121037483 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.