| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| OSAK / WETH | uniswap_v2 | 0x05c0...aa51 | 0.0000000557682404752426 |
| SHIB / OSAK | uniswap_v2 | 0x9ad3...48d9 | 0.0000000556018505161461 |
| OSAK / ETH 2% | uniswap-v4-ethereum | 0x3e14...5de2 | 0.0000000554700734496906 |
| crvUSD / WETH / OSAK | curve | 0x6a62...715a | 0.9742152941588863159650263367607767422116722941881260510729844548 |
| OSAK / TREAT 1% | uniswap-v4-ethereum | 0x6811...3235 | 0.0000000579261747348442 |
| OSAK / WETH 1% | uniswap_v3 | 0x6208...654f | 0.00000007762106918 |
| USDC / OSAK 2% | uniswap-v4-ethereum | 0x898d...9c35 | 0.0000001926628837 |
| OSAK / Mog 0.75% | uniswap-v4-ethereum | 0xc621...0bff | 0.0000001605673115 |
| OSAK / Mog 0.3% | uniswap-v4-ethereum | 0x93be...cbea | 0.0000002067614745 |
| USDC / OSAK 0.05% | uniswap-v4-ethereum | 0x307a...e18a | 0.00000009745268195 |
| OSAK / Mog 1% | uniswap-v4-ethereum | 0x9c17...09ec | 0.000000214529739 |
| USDC / OSAK 1% | uniswap-v4-ethereum | 0xcfc6...db68 | 0.0000001914059643 |
| OSAK / SPX 1% | uniswap-v4-ethereum | 0x2c80...220d | 0.000000214529739 |
| APU / OSAK 0.3% | uniswap-v4-ethereum | 0x1607...0b1a | 0.0000002004991625 |
| USDC / OSAK 88% | uniswap-v4-ethereum | 0x9b7b...15eb | 0.000001834483025 |
| SHIB / OSAK 0.3% | uniswap-v4-ethereum | 0xc94c...0159 | 0.0000001913036973 |
| SHIB / OSAK 1% | uniswap-v4-ethereum | 0x525f...50c0 | 0.0000002101932263 |
| PEPE / OSAK 0.3% | uniswap-v4-ethereum | 0xe590...a7f3 | 0.0000001911560505 |
| USDC / OSAK 0.01% | uniswap-v4-ethereum | 0x0c3d...8c6e | 0.0000001669393132 |
| OSAK / ETH 0.01% | uniswap-v4-ethereum | 0x3525...4b2c | 0.0000001570411862 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.