| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| BRM / ETH 98.2% | uniswap-v4-ethereum | 0x5c19...c5ee | 0.000007961193667 |
| BRM / ETH 98% | uniswap-v4-ethereum | 0x1eaf...7330 | 0.00000449914986 |
| BRM / ETH 90% | uniswap-v4-ethereum | 0x0772...cc05 | 0.000005179296986 |
| BRM / ETH 99% | uniswap-v4-ethereum | 0x6119...795e | 0.000001195889256 |
| BRM / ETH 97% | uniswap-v4-ethereum | 0x6da8...07f7 | 0.0003920250859 |
| BRM / ETH 99.01% | uniswap-v4-ethereum | 0x38ce...216b | 0.0000003204160837 |
| BRM / WETH 1% | uniswap_v3 | 0xd564...f1d0 | 0.00003788791086 |
| BRM / WETH 0.05% | uniswap_v3 | 0x6f5e...5ec0 | 0.00008452950239 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.