| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ROOT / WETH | uniswap_v2 | 0xfb44...776f | 0.000237209467347138 |
| ROOT / ETH 1% | uniswap-v4-ethereum | 0x8d6d...ba0d | 0.005270404306 |
| ROOT / WETH 1% | uniswap_v3 | 0x9438...c164 | 0.00000000455400441 |
| ROOT / USDT 88% | uniswap-v4-ethereum | 0xa6c6...7895 | 0.000241233408615757 |
| USDC / ROOT 3% | uniswap-v4-ethereum | 0xb1af...e761 | 0.001394341542 |
| ROOT / USDT 4% | uniswap-v4-ethereum | 0x9cad...5b28 | 0.001566233906 |
| USDC / ROOT | uniswap_v2 | 0x3aa6...6e26 | 0.0009736850317 |
| ZRO / ROOT 0.3% | uniswap_v3 | 0x99e3...b8e1 | 0.03441863957 |
| PLMS / ROOT 1% | uniswap_v3 | 0xea89...df0a | 0.002561079896 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.