| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| TCR / WETH 0.3% | uniswap_v3 | 0x10b5...1e2c | 0.000220055392071709 |
| TCR / WETH | sushiswap | 0xe55c...88ac | 0.000207868754948234 |
| TCR / DAI 5% | balancer_ethereum | 0x96ba...8747 | 0.0001474464852 |
| TCR / WETH | uniswap_v2 | 0xdc08...9419 | 0.000216511353 |
| TCR / USDC 1% | uniswap_v3 | 0x77d7...1865 | 0.01481884841702234926743255613193 |
| TCR / WETH 1% | uniswap_v3 | 0x9a0a...8094 | 0.012055626409892999863538048688 |
| tTCR / TCR | curve | 0x01fe...011f | 0.01486908865698466077997620669671 |
| TCR / WETH 0.3% | balancer_ethereum | 0x3bb9...48d1 | 0.0006877544409 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.