| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| PP / WETH | uniswap_v2 | 0xbddf...3a49 | 0.000000258391176292764 |
| PP / USDC | uniswap_v2 | 0x03df...681f | 0.000000259628072392354 |
| PP / WETH | 9inch-ethereum | 0xe1b2...b5be | 0.000000262281931599138 |
| M3M3 / PP | uniswap_v2 | 0x9381...965a | 0.000000246206577 |
| PP / 9INCH | 9inch-ethereum | 0x688a...45fd | 0.000000259455014835076 |
| PLD / PP | uniswap_v2 | 0x9b79...ef98 | 0.0000002503923148 |
| PLD / PP | 9inch-ethereum | 0xf685...0074 | 0.0000002476122509 |
| PP / WETH 1% | uniswap_v3 | 0x0cae...af91 | 0.0000002488115534 |
| HEX / PP | uniswap_v2 | 0xdf23...bba7 | 0.0000002882164603 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.