| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| KYO / USDT 0.3% | uniswap_v3 | 0xf966...21f9 | 0.0899919072037295 |
| USDC / KYO 5% | uniswap-v4-ethereum | 0x2f15...83b4 | 0.173727641850207 |
| KYO / ETH 15% | uniswap-v4-ethereum | 0xb00b...79b6 | 0.0954287373104364 |
| KYO / USDT 30% | uniswap-v4-ethereum | 0x6edb...2933 | 0.182135461459046 |
| USDC / KYO 4% | uniswap-v4-ethereum | 0x8682...d072 | 0.114298429820365 |
| KYO / ETH 3% | uniswap-v4-ethereum | 0x28c8...e184 | 0.142335401344518 |
| KYO / USDT 4% | uniswap-v4-ethereum | 0x4895...da98 | 0.168093419462544 |
| KYO / ETH 5% | uniswap-v4-ethereum | 0xbcd4...efcc | 0.106094267148053 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.