| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| NEURON / WETH 1% | uniswap_v3 | 0x840f...bcac | 0.0000641089432269272 |
| NEURON / BIO 1% | uniswap_v3 | 0x4384...b2ef | 0.000063810976502299 |
| NEURON / BIO 1% | uniswap-v4-ethereum | 0xd2fc...d1f5 | 0.00006661011195 |
| NEURON / ETH 0.3% | uniswap-v4-ethereum | 0xae21...cb82 | 0.00009914167896 |
| NEURON / BIO 0.3% | uniswap_v3 | 0x53c6...51b0 | 0.0002038414065 |
| USDC / NEURON 0.3% | uniswap_v3 | 0xf7bd...c86e | 0.0003547581114 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.