| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| CEL / WETH | uniswap_v2 | 0xa5e7...9fe6 | 0.0198415621846197 |
| KEL / CEL 0.05% | uniswap_v3 | 0x85fe...78c5 | 0.0196031542677738 |
| KEL / CEL | uniswap_v2 | 0x638b...4756 | 0.0198875057312289 |
| CEL / WETH | sushiswap | 0x796b...cb26 | 0.0196233993235928 |
| CEL / WETH 1% | uniswap_v3 | 0xde2a...0c98 | 3.5036814062 |
| CEL / WETH 0.3% | uniswap_v3 | 0x0672...5105 | 1.40006137133225 |
| ICHI / CEL 0.3% | uniswap_v3 | 0x6e41...d319 | 0.02927679925 |
| CEL / USDT 1% | uniswap_v3 | 0x8254...491b | 0.009556842664 |
| CEL / QASH | uniswap_v2 | 0x4a9d...376a | 3.3371405661 |
| CEL / USDC | uniswap_v2 | 0x3ef4...08f0 | 0.06322828226 |
| CEL / USDT | uniswap_v2 | 0xbcc6...e7e5 | 0.1250737566 |
| CEL / WBTC | uniswap_v2 | 0xff3e...9139 | 0.08775645398 |
| RLX / CEL | uniswap_v2 | 0x2a7f...1e32 | 1.99490033515865 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.