| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| Metis / WETH 0.3% | uniswap_v3 | 0x1c98...35d9 | 4.74234352143563 |
| Metis / WETH | sushiswap | 0xdab6...4603 | 4.74707096182862 |
| Metis / WETH | uniswap_v2 | 0xd03d...16e3 | 4.80227668795951 |
| Metis / ETH 0.3% | uniswap-v4-ethereum | 0xa661...17bc | 18.7316915467 |
| Metis / WETH | standard_ethereum | 0xf123...bc06 | 5.34015234805412 |
| STND / Metis | standard_ethereum | 0x7149...bfec | 4.82456911933255 |
| Metis / USDC 1% | uniswap_v3 | 0xfc28...54b6 | 47.3945662321067 |
| SAFE / Metis 0.3% | uniswap_v3 | 0x30cb...6fec | 5.1533436354 |
| Metis / WETH 1% | uniswap_v3 | 0x40a3...43d5 | 77.9990846215 |
| Metis / KABOSU | uniswap_v2 | 0x5dce...e2ba | 5.989343077 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.