| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| Yee / WETH | uniswap_v2 | 0xbc7c...5516 | 0.00592713444334139 |
| Yee / WETH 1% | uniswap_v3 | 0xb214...25b4 | 0.00587057773143777 |
| Yee / WBTC 1% | uniswap-v4-ethereum | 0x23d1...d191 | 0.0057487146613401 |
| PNDC / Yee 1% | uniswap-v4-ethereum | 0xec36...2f4c | 0.0058921846634417 |
| Yee / ETH 4% | uniswap-v4-ethereum | 0x1cd2...d05d | 0.00544779990883547 |
| Yee / ETH 1% | uniswap-v4-ethereum | 0x8712...a034 | 0.00556179117770581 |
| Yee / USDC 0.3% | uniswap-v4-ethereum | 0xe201...6ad6 | 0.00565043383906308 |
| Yee / Yee | uniswap_v2 | 0xba00...ba24 | 0.002986833465 |
| Yee / ETH 0.3% | uniswap-v4-ethereum | 0x8303...6cf9 | 0.008502570161 |
| Yee / JAKEX 1% | uniswap_v3 | 0x1613...db28 | 0.004661392463 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.