| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| KISHU / WETH | uniswap_v2 | 0xf82d...9f88 | 0.000000000041601219863118 |
| KISHU / WETH | shibaswap | 0x9f12...64ac | 0.0000000000412431687379775 |
| AKITA / KISHU | shibaswap | 0xd979...79e7 | 0.0000000000428156648907914 |
| KISHU / USDT | uniswap_v2 | 0xbe0c...2d55 | 0.0000000000469501730800842 |
| KISHU / WETH | sushiswap | 0xbe30...f6d2 | 0.0000000000402076430122277 |
| ELON / KISHU | shibaswap | 0xc9cf...a923 | 0.0000000000415108936426788 |
| KISHU / AMP | shibaswap | 0xe6d1...a88e | 0.0000000000415108936426788 |
| KLEE / KISHU | shibaswap | 0xb734...18b8 | 0.0000000000434196241831796 |
| KISHU / SHIB | uniswap_v2 | 0x971f...f5a3 | 0.0000000000430817318259012 |
| KISHU / WETH 1% | uniswap_v3 | 0xcdc0...656b | 0.00000000442797513 |
| SHIB / KISHU | shibaswap | 0x428e...3d10 | 0.0000000000413121620982312 |
| KISHU / PYRENEES | uniswap_v2 | 0x43cb...fad0 | 0.00000000005253525597 |
| BONE / KISHU | shibaswap | 0x8db8...79d8 | 0.0000000000694995675 |
| FEG / KISHU | shibaswap | 0xb907...414b | 0.0000000001244137281 |
| ZOOT / KISHU | shibaswap | 0x652b...ee20 | 0.00000000004715816844 |
| MATIC / KISHU | shibaswap | 0x8179...332e | 0.00000000053641384708066288547095572760025703839727028737324249393311054223544470940064742620148976 |
| REDPANDA / KISHU | shibaswap | 0xf6bb...67db | 0.0000000001942117111 |
| KISHU / KABOSU | uniswap_v2 | 0x3ddf...3267 | 0.0000000002243670633 |
| KISHU / USDT | pancakeswap_ethereum | 0xc30d...c7a5 | 0.0000000000414121157815176 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.