| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| BONDLY / WETH | uniswap_v2 | 0x4d31...9fd6 | 0.000521129382121515 |
| BONDLY / WETH | sushiswap | 0x65f5...1d20 | 0.000538508349282248 |
| BONDLY / TOWER | sushiswap | 0x90e4...da51 | 0.00051974098437428 |
| BONDLY / REVV | sushiswap | 0xab70...8397 | 0.000532513324120106 |
| BONDLY / WETH 1% | uniswap_v3 | 0x0d38...295e | 0.024148175386018 |
| GMEE / BONDLY | sushiswap | 0x9c3e...f1c2 | 0.000512874369071328 |
| LYM / BONDLY | sushiswap | 0x9f59...72f2 | 0.0007618496754 |
| BONDLY / LMT | sushiswap | 0xca71...347b | 0.0007894304232 |
| QUIDD / BONDLY | sushiswap | 0x16c4...a926 | 0.0006787463522 |
| BONDLY / UMAD | sushiswap | 0xa602...c327 | 0.000542656791 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.