| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| K9 / WETH 1% | uniswap_v3 | 0x742c...c872 | 0.0002797667026 |
| K9 / USDC 1% | uniswap_v3 | 0x14bd...927a | 0.0002764681426 |
| APE / K9 1% | uniswap_v3 | 0x110e...07a0 | 0.000281959101083418 |
| K9 / WETH 1% | pancakeswap-v3-ethereum | 0x13a1...4357 | 0.0002764918866 |
| K9 / USDC 1% | uniswap-v4-ethereum | 0xdbe5...855a | 0.0002773027502 |
| K9 / TKP 1% | uniswap_v3 | 0x2015...9126 | 0.0001987739085 |
| K9 / TKP 1% | uniswap-v4-ethereum | 0x86f8...bc18 | 0.0002350794612 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.