| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| WOM / ETH 65% | uniswap-v4-ethereum | 0xf40d...b0d9 | 0.00011014684598329 |
| WOM / USDT 89.998% | uniswap-v4-ethereum | 0x8741...e889 | 0.0000198010812093608 |
| WOM / ETH 60% | uniswap-v4-ethereum | 0xd3b3...468f | 0.0000626918176621251 |
| WOM / USDT 90% | uniswap-v4-ethereum | 0x9b69...8c63 | 0.00003796846618 |
| WOM / ETH 72% | uniswap-v4-ethereum | 0x90b4...ac7b | 0.0004639238176 |
| WOM / ETH 75% | uniswap-v4-ethereum | 0x6d28...ac41 | 0.002105361464 |
| WOM / USDT 89.999% | uniswap-v4-ethereum | 0x85f8...de4c | 0.00001777453573 |
| WOM / ETH 91% | uniswap-v4-ethereum | 0x29c4...432c | 0.005915782166 |
| WOM / ETH 90% | uniswap-v4-ethereum | 0xd9ae...e584 | 0.03076019662 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.