| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| CEL / WETH | uniswap_v2 | 0xa5e7...9fe6 | 0.0235169885025079 |
| KEL / CEL | uniswap_v2 | 0x638b...4756 | 0.0270865974663848 |
| KEL / CEL 0.05% | uniswap_v3 | 0x85fe...78c5 | 0.02715526419 |
| CEL / WETH 1% | uniswap_v3 | 0xde2a...0c98 | 3.5036814062 |
| CEL / WETH | sushiswap | 0x796b...cb26 | 0.0241388093140355 |
| CEL / WETH 0.3% | uniswap_v3 | 0x0672...5105 | 1.40006137133225 |
| CEL / USDC 0.3% | uniswap_v3 | 0x8ec8...1e4e | 0.974033739289292451438313084887 |
| CEL / USDC 1% | uniswap_v3 | 0x7ffb...8d7d | 2.04818017936823 |
| ICHI / CEL 0.3% | uniswap_v3 | 0x6e41...d319 | 0.0311551595 |
| ICHI / CEL 0.3% | uniswap_v3 | 0x2953...4c6e | 0.1107223193 |
| CEL / USDT 1% | uniswap_v3 | 0x8254...491b | 0.03742544772 |
| DRGN / CEL 1% | uniswap_v3 | 0xd321...ebda | 0.240462759213321 |
| CEL / QASH | uniswap_v2 | 0x4a9d...376a | 3.3371405661 |
| CEL / USDC | uniswap_v2 | 0x3ef4...08f0 | 0.04459689559 |
| CEL / USDT | uniswap_v2 | 0xbcc6...e7e5 | 0.05552109258 |
| CEL / WBTC | uniswap_v2 | 0xff3e...9139 | 0.04664743878 |
| CEL / DAI 1% | uniswap_v3 | 0x1e8f...7c55 | 0.959799695480517527955880198 |
| RLX / CEL | uniswap_v2 | 0x2a7f...1e32 | 1.99490033515865 |
| SALT / CEL | uniswap_v2 | 0xd03d...aea4 | 1.55863149339988 |
| CBIX7 / CEL | uniswap_v2 | 0x6adb...ac60 | 0.81163162214376765958185759712473288875444880334778066227443903758095661242257639118971546 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.