| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| Daruma / USDC | uniswap_v2 | 0x4d42...a535 | 0.00001455326697 |
| Daruma / USDC 1% | uniswap_v3 | 0xe2d2...5657 | 0.000291372621965088482713592129160739621132191367833113808 |
| Daruma / WETH 1% | uniswap_v3 | 0x5565...4fe5 | 0.00000000000000000000000000000000000000000000459511971821903 |
| STATE / Daruma | uniswap_v2 | 0x94e3...02d0 | 0.000083816098490630600679673574098721284818720591564300677028147083058226657473546604324707774135460899218769910144966833150539342232 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.