| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| VULT / USDC 1% | uniswap_v3 | 0x6df5...9020 | 0.223383325351705 |
| VULT / cbBTC | uniswap_v2 | 0xa5a8...101d | 0.224012478902866 |
| XAUt / VULT | uniswap_v2 | 0xd882...f98c | 0.226601745344883 |
| VULT / WETH 1% | uniswap_v3 | 0xedec...46af | 0.480425848369243 |
| VULT / ETH 9% | uniswap-v4-ethereum | 0x5da2...7039 | 0.1679970082 |
| USDC / VULT 15% | uniswap-v4-ethereum | 0xbf06...7b8c | 0.327411461 |
| USDC / VULT 0.05% | uniswap-v4-ethereum | 0x4086...5a7a | 0.1543703278 |
| VULT / ETH 1% | uniswap-v4-ethereum | 0xf66f...2917 | 0.1886414837 |
| VULT / USDT 0.3% | uniswap-v4-ethereum | 0x8d56...7289 | 0.1710800049 |
| USDC / VULT 1% | uniswap-v4-ethereum | 0x59ac...b776 | 0.449561027 |
| USDC / VULT 0.3% | uniswap_v3 | 0x9f3e...3077 | 0.1010759709 |
| VULT / WETH 0.3% | uniswap_v3 | 0x3b5f...5299 | 0.1702909548 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.