| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| BONDLY / WETH | uniswap_v2 | 0x4d31...9fd6 | 0.0003560447536 |
| BONDLY / WETH | sushiswap | 0x65f5...1d20 | 0.0003482415777 |
| BONDLY / TOWER | sushiswap | 0x90e4...da51 | 0.0003570426968 |
| BONDLY / REVV | sushiswap | 0xab70...8397 | 0.0003505775696 |
| BONDLY / WETH 1% | uniswap_v3 | 0x0d38...295e | 0.024148175386018 |
| BONDLY / WETH 0.3% | uniswap_v3 | 0x7b83...c3d5 | 0.001089545298364916324125771022764283447361414008390005663 |
| BONDLY / USDC 1% | uniswap_v3 | 0x39a9...0689 | 0.00824900576648209941902761318033 |
| GMEE / BONDLY | sushiswap | 0x9c3e...f1c2 | 0.0003676313261 |
| LYM / BONDLY | sushiswap | 0x9f59...72f2 | 0.0003577104824 |
| BONDLY / LMT | sushiswap | 0xca71...347b | 0.0007894304232 |
| QUIDD / BONDLY | sushiswap | 0x16c4...a926 | 0.0006787463522 |
| BONDLY / UMAD | sushiswap | 0xa602...c327 | 0.000542656791 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.