| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ETP / WETH 0.3% | uniswap_v3 | 0x4102...99a9 | 0.46066978 |
| ASI / ETP | uniswap_v2 | 0x2c1f...8a3e | 0.08689028668 |
| ETP / WETH 1% | uniswap_v3 | 0x9e22...8582 | 0.05793250049 |
| ASI / ETP 0.3% | uniswap_v3 | 0x196c...9697 | 0.499216665208043 |
| GAS / ETP | uniswap_v2 | 0x1dda...8aef | 0.1016529126 |
| ETP / WBTC | uniswap_v2 | 0xbc02...ef54 | 0.03316127241 |
| ETP / WETH | uniswap_v2 | 0x0c56...c7f8 | 0.05623624878 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.