| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| DUST / USDT 55% | uniswap-v4-ethereum | 0x1180...4842 | 0.002453321409 |
| DUST / USDT 94% | uniswap-v4-ethereum | 0xb0ff...157d | 0.01289107875 |
| DUST / USDT 89% | uniswap-v4-ethereum | 0x339b...1145 | 0.1225674214 |
| DUST / WETH 0.3% | uniswap_v3 | 0xccab...6764 | 0.8810967798 |
| USDC / DUST 99.985% | uniswap-v4-ethereum | 0xdf11...f73f | 0.00288327177 |
| DUST / USDT 99.5% | uniswap-v4-ethereum | 0x6bae...1600 | 0.002227230877 |
| USDC / DUST 89.98% | uniswap-v4-ethereum | 0x8b9b...cea1 | 0.0004632688723 |
| DUST / USDT 60% | uniswap-v4-ethereum | 0x3417...8b72 | 0.007814703795 |
| USDC / DUST 95% | uniswap-v4-ethereum | 0xf8f1...64e5 | 0.002946571053 |
| μDEGODS / DUST 0.3% | uniswap_v3 | 0x3d88...8df5 | 0.280893630460438 |
| DUST / μy00t 0.3% | uniswap_v3 | 0x91da...7a60 | 0.281218766019352 |
| DUST / WETH 1% | uniswap_v3 | 0xbcea...2a9c | 1.42356484338169 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.