| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| BSKT / WETH 0.3% | uniswap_v3 | 0x9ad8...f820 | 0.0000614049536338227 |
| RNDR / BSKT 1% | uniswap_v3 | 0x9ba4...8f24 | 0.000000365472715 |
| CAH / BSKT 1% | uniswap_v3 | 0x5189...df6c | 0.0000003753421169 |
| SHFL / BSKT 1% | uniswap_v3 | 0x0c87...5a94 | 0.0000003650491349 |
| MAVIA / BSKT 1% | uniswap_v3 | 0xcbfc...e41d | 0.0000003726854928 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.