| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| DOSE / WETH | uniswap_v2 | 0x541e...194c | 0.00000946331750233416 |
| DOSE / REVV | sushiswap | 0x2d42...218a | 0.0000101796252356996 |
| TOWER / DOSE | uniswap_v2 | 0x2954...b765 | 0.0000101796252356996 |
| UMAD / DOSE | uniswap_v2 | 0x92bc...8008 | 0.00000873075814990871 |
| DOSE / WETH | sushiswap | 0xe2e9...88f6 | 0.00001295416901 |
| PRIMATE / DOSE | sushiswap | 0x6137...9318 | 0.00001245763214 |
| UMAD / DOSE | sushiswap | 0xe7b3...e34b | 0.0002632305746 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.