| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| UNIC / WETH | unicly | 0x314d...f165 | 0.139163019096899 |
| uUNICLY / UNIC | unicly | 0x5062...e144 | 0.1599115044 |
| UNIC / uJENNY | unicly | 0x8005...fbc3 | 0.1646363342 |
| uDOKI / UNIC | unicly | 0x50b5...b9da | 0.1615444816 |
| uAXIE / UNIC | unicly | 0xe5c5...371e | 0.1387476157 |
| uMOON / UNIC | unicly | 0x6ad2...1298 | 0.1495336799 |
| uCM / UNIC | unicly | 0x4293...7e3e | 0.1427234094 |
| UNIC / USDC | uniswap_v2 | 0xe42b...5df4 | 0.1453617457 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.