| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ICHI / WETH | sushiswap | 0x9cd0...d069 | 0.18876635645503 |
| ICHI / WETH | uniswap_v2 | 0xd07d...b20c | 0.188476468116298 |
| ICHI / oneBTC 1% | uniswap_v3 | 0xe45d...94c0 | 0.188118521372751 |
| wNXM / ICHI 0.3% | uniswap_v3 | 0x0002...0352 | 0.1911896073 |
| ICHI / WETH 1% | uniswap_v3 | 0x55f2...621c | 1.1862987078 |
| ICHI / WBTC 0.3% | uniswap_v3 | 0x6800...954c | 0.190604254831502 |
| oneUNI / ICHI 1% | uniswap_v3 | 0x6ded...bf33 | 0.2053835803 |
| GNO / ICHI 0.3% | uniswap_v3 | 0xa5a4...25b4 | 0.184857322863974 |
| ICHI / CEL 0.3% | uniswap_v3 | 0x2953...4c6e | 0.1926592943 |
| ICHI / WETH 0.3% | uniswap_v3 | 0x275e...4f2d | 2.2260835969 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.