| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ORCLon / USDT 0.3% | uniswap_v3 | 0x5f29...e1f9 | 197.1450059989 |
| ORCLon / USDC 29% | uniswap-v4-ethereum | 0xc31c...debf | 294.0394453209 |
| ORCLon / USDT 50% | uniswap-v4-ethereum | 0xa0ae...259e | 155.6934737947 |
| ORCLon / USDC 40% | uniswap-v4-ethereum | 0x172f...7a73 | 161.7339134498 |
| ORCLon / ETH 47% | uniswap-v4-ethereum | 0x17d9...3663 | 470.7154993967 |
| ORCLon / USDC 28% | uniswap-v4-ethereum | 0x663e...be6d | 149.8679809603 |
| ORCLon / USDC 71% | uniswap-v4-ethereum | 0x0811...3af6 | 151.6116872048 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.