| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| TSLAx / USDC | pancakeswap_ethereum | 0x1ee3...356c | 405.4616320022 |
| TSLAx / USDC 88% | uniswap-v4-ethereum | 0x0c95...6591 | 5217.2061553643 |
| TSLAx / USDC 40% | uniswap-v4-ethereum | 0x9dd5...164c | 475.6622527641 |
| TSLAx / USDC 0.3% | uniswap_v3 | 0xa7fd...9cc6 | 411.2572283602 |
| TSLAx / USDC 20% | uniswap-v4-ethereum | 0x99f3...3002 | 344.8755669972 |
| TSLAx / USDC 70% | uniswap-v4-ethereum | 0x89cc...9b0e | 2777.1342496247 |
| TSLAx / USDC 50% | uniswap-v4-ethereum | 0x24ec...1d59 | 172.3974474204 |
| TSLAx / USDC 55% | uniswap-v4-ethereum | 0xb809...94f2 | 650.5739036119 |
| TSLAx / USDC | uniswap_v2 | 0x9e1c...83bc | 367.1911592348 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.