| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| TURBO / WETH 1% | uniswap_v3 | 0x7bae...d810 | 0.0009189554828 |
| rust / TURBO 1% | uniswap-v4-ethereum | 0x90ad...e93f | 0.000950304711786956 |
| TURBO / WETH 0.3% | uniswap_v3 | 0x8107...3d94 | 0.0009264991032 |
| TURBO / ETH 1% | uniswap-v4-ethereum | 0x73ac...a6c1 | 0.001035794783 |
| turboBLOOD / TURBO 0.01% | uniswap_v3 | 0x822f...9775 | 0.002493570216 |
| USDC / TURBO 0.3% | uniswap-v4-ethereum | 0xeba8...f53d | 0.003596331225 |
| TURBO / USDT 88% | uniswap-v4-ethereum | 0x81f5...d65f | 0.0005399445038 |
| AAVE / TURBO 1% | uniswap-v4-ethereum | 0xf83e...318d | 0.005873583257 |
| TURBO / KABOSU 0.3% | uniswap-v4-ethereum | 0x77f2...07d5 | 0.004158666686 |
| BLOOD / TURBO 0.01% | uniswap_v3 | 0x2c4f...a6c3 | 0.00581276221587215 |
| TURBO / WETH | uniswap_v2 | 0x455d...5587 | 0.001051105928 |
| USDC / TURBO 0.9% | uniswap-v4-ethereum | 0x93a7...4f90 | 0.002558727002 |
| PEPE / TURBO 1% | uniswap_v3 | 0x1d7c...0c89 | 0.008490027583 |
| TURBO / SIMP 1% | uniswap_v3 | 0xb76a...f532 | 0.001185216199 |
| PEPE / TURBO 0.3% | uniswap-v4-ethereum | 0x69bc...9bb2 | 0.002098101916 |
| TURBO / USDC 1% | uniswap_v3 | 0x3a49...d28c | 0.000600317228898437 |
| TURBO / WETH 0.01% | sushiswap-v3-ethereum | 0x3ee4...5b32 | 0.0000005266453124 |
| TURBO / Mog 0.3% | uniswap_v3 | 0x7f9f...78c6 | 0.00513182992788723 |
| USDC / TURBO 0.3% | uniswap_v3 | 0x6970...8196 | 0.00527100416804631 |
| GENAI / TURBO 1% | uniswap_v3 | 0x358b...a962 | 0.00618897861712777 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.