| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| KYO / ETH 99.9% | uniswap-v4-ethereum | 0x863f...4b79 | 0.01037085031 |
| KYO / USDT 0.3% | uniswap_v3 | 0xf966...21f9 | 0.024322073 |
| USDC / KYO 5% | uniswap-v4-ethereum | 0x2f15...83b4 | 0.1737276419 |
| KYO / ETH 15% | uniswap-v4-ethereum | 0xb00b...79b6 | 0.09555624333 |
| KYO / USDT 30% | uniswap-v4-ethereum | 0x6edb...2933 | 0.1800117643 |
| USDC / KYO 4% | uniswap-v4-ethereum | 0x8682...d072 | 0.1142984298 |
| KYO / ETH 3% | uniswap-v4-ethereum | 0x28c8...e184 | 0.1423354013 |
| USDC / KYO 65% | uniswap-v4-ethereum | 0xd680...4f5a | 0.009665898413 |
| KYO / USDT 4% | uniswap-v4-ethereum | 0x4895...da98 | 0.1680934195 |
| KYO / ETH 5% | uniswap-v4-ethereum | 0xbcd4...efcc | 0.1060942671 |
| USDC / KYO 80% | uniswap-v4-ethereum | 0xd8fc...b0d0 | 0.009347330876 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.