| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| TLTon / USDC 1% | uniswap_v3 | 0x2f21...b96c | 88.2517473919 |
| TLTon / USDC 45% | uniswap-v4-ethereum | 0x8467...2b41 | 116.5267530229 |
| TLTon / USDC 75% | uniswap-v4-ethereum | 0x16b0...8743 | 21.8658029471 |
| TLTon / ETH 47% | uniswap-v4-ethereum | 0x898e...28f0 | 110.9819360374 |
| TLTon / USDC 29% | uniswap-v4-ethereum | 0x3969...2265 | 78.2470619116 |
| TLTon / USDC 70% | uniswap-v4-ethereum | 0x6706...8f71 | 23.7720843765 |
| TLTon / USDT 50% | uniswap-v4-ethereum | 0xe045...132d | 180.8758298038 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.