| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| wstETH / DOG | uniswap_v2 | 0x801c...386c | 0.000880142085903637 |
| DOG / WETH 0.3% | uniswap_v3 | 0x9b34...8373 | 0.000880257629303425 |
| DOG / WETH | sushiswap | 0xc96f...65b1 | 0.000879200598911723 |
| DOG / USDT 0.05% | uniswap_v3 | 0x3cc5...d65a | 0.005074635822 |
| DOG / USDT 1% | uniswap_v3 | 0xd978...5bc4 | 0.000889814553 |
| USDC / DOG 88% | uniswap-v4-ethereum | 0x0efc...9bd5 | 0.02003250322 |
| DOG / USDT 0.01% | uniswap_v3 | 0xc13f...1442 | 0.004005962905 |
| DOG / USDC 0.05% | uniswap_v3 | 0x8862...08a2 | 0.000880908946021934 |
| DOG / ETH 0.3% | uniswap-v4-ethereum | 0x441b...e177 | 0.002387143369 |
| DOG / WETH 1% | uniswap_v3 | 0x7731...77da | 0.001310238767 |
| DOG / SNOOP | sushiswap | 0x3a61...0052 | 0.0009580187812 |
| stETH / DOG | uniswap_v2 | 0x2d61...2836 | 0.001452221132 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.