| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| JPYR / PHPR 1% | uniswap_v3 | 0x558f...1a19 | 0.00516031685000385 |
| JPYR / JPYC 0.05% | uniswap_v3 | 0x6dcf...d17f | 0.00533279047802777 |
| JPYR / USDT 0.05% | uniswap_v3 | 0x1ac3...0f8f | 0.00533395078034334 |
| JPYR / ETH 0.01% | uniswap-v4-ethereum | 0x4479...cd05 | 0.005742232927 |
| JPYR / USDT 0.05% | balancer-v3-ethereum | 0x438f...5de4 | 0.00543652866287131 |
| JPYR / JPYC 0.05% | balancer-v3-ethereum | 0xb4d4...01ed | 0.006036851709 |
| JPYR / JPYC 0.05% | pancakeswap-v3-ethereum | 0x6fb5...53e9 | 0.006239397678 |
| JPYR / JPYC 0.05% | sushiswap-v3-ethereum | 0x2347...3717 | 0.00563284948396868 |
| JPYR / JPYC | uniswap_v2 | 0x2660...2784 | 0.005371051065 |
| JPYR / USDT 0.3% | balancer-v3-ethereum | 0x4391...b297 | 0.01999995106 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.