| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| BONE / WETH | shibaswap | 0xefb4...a477 | 0.05753002204 |
| SHIB / BONE | shibaswap | 0xff64...ee22 | 0.0575153627019998 |
| BONE / WETH | uniswap_v2 | 0xf7d3...96b7 | 0.05819691957 |
| BONE / TREAT 0.9% | uniswap-v4-ethereum | 0xcf24...a839 | 0.05709204479 |
| BONE / WETH 0.3% | uniswap_v3 | 0xb011...b1ff | 0.05768183714 |
| FEG / BONE | shibaswap | 0x8e62...cf6f | 0.0584517286953037 |
| BONE / KISHU | shibaswap | 0x8db8...79d8 | 0.05793118745 |
| BONE / USDC 0.3% | kyberswap_elastic | 0x39e0...80ad | |
| BONE / USDC 1% | kyberswap_elastic | 0x5788...7461 | 1.69146227657567050969312622142 |
| BONE / WETH 1% | uniswap_v3 | 0x3be0...87ec | 0.05722423192 |
| BONE / ETH 10% | uniswap-v4-ethereum | 0x9412...c421 | 0.224924082 |
| BONE / ETH 3% | uniswap-v4-ethereum | 0x2849...a54b | 0.05952506801 |
| BURNBONE / BONE | uniswap_v2 | 0x2ac0...bb54 | 1.35315339948506734806999406416662316930855301288169141873721683761851488813089213499587262 |
| BONE / USDT 1% | uniswap_v3 | 0x833d...6b86 | 99.2764702533947 |
| SHIB / BONE 1% | uniswap_v3 | 0xfeae...ffa6 | 0.0571847206932634 |
| BONE0.5 / BONE | uniswap_v2 | 0x7119...5ec4 | 0.07938623258 |
| BONE / TREAT | shibaswap | 0x8e5e...a381 | 0.06067999844 |
| SAS / BONE | uniswap_v2 | 0xd8f5...5fe6 | 0.0571859665451086 |
| 0NE / BONE | shibaswap | 0x9ebc...491d | 0.05354934064 |
| BONE / USDC | shibaswap | 0x29e0...b059 | 0.05838399764 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.