| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| AMZNon / ETH 48% | uniswap-v4-ethereum | 0xfd78...5fd5 | 493.472956702754 |
| USDC / AMZNon 29% | uniswap-v4-ethereum | 0xdeec...6a1d | 436.675107866441 |
| USDC / AMZNon 30% | uniswap-v4-ethereum | 0xb057...202d | 516.423480998682 |
| AMZNon / USDT 50% | uniswap-v4-ethereum | 0x639f...3b11 | 514.3365990659 |
| AMZNon / USDT 40% | uniswap-v4-ethereum | 0x6dd1...631e | 454.384878374419 |
| AMZNon / USDC 90% | uniswap-v4-ethereum | 0x96e0...f314 | 2664.9974433653 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.