| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| DORKL / WETH | uniswap_v2 | 0xef9e...b077 | 0.0000904456152136041 |
| DORKL / WETH 1% | uniswap_v3 | 0xf7f3...3651 | 0.0001367234771 |
| JEDI / DORKL | uniswap_v2 | 0x54f2...8468 | 0.00158480478780043 |
| DORKL / WETH | x7-finance | 0x286d...caf9 | 0.0001350515272 |
| BITCOIN / DORKL 1% | uniswap_v3 | 0xb93b...33ad | 0.00516941836727456 |
| DORKL / WETH 0.3% | uniswap_v3 | 0x3fcc...48b2 | 0.00196697794669497 |
| DORKL / JNE 1% | uniswap_v3 | 0x239b...d9d0 | 0.00157151874953781 |
| DORKL / SPX 1% | uniswap_v3 | 0x581c...08d6 | 0.0061054804850196 |
| DORKL / ZAPT | uniswap_v2 | 0x45ea...1a33 | 0.00258726032047822 |
| JEDI / DORKL 1% | uniswap_v3 | 0xe495...3268 | 0.00237838152704646 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.