| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| WG0 / WETH | uniswap_v2 | 0xd00e...5493 | 46.0005871856 |
| WVG0 / WG0 1% | uniswap_v3 | 0xe9d2...1273 | 86.1534037153 |
| WG0 / UNI 1% | uniswap_v3 | 0x2027...b5f3 | 86.7461698577965 |
| WG0 / WETH 1% | uniswap_v3 | 0x7a90...bf14 | 102.542049319726 |
| WCK / WG0 1% | uniswap_v3 | 0x1a61...86f5 | 113.3070101395218460459870859601 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.