| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| PEPE / WETH | uniswap_v2 | 0x8616...f838 | 0.000259781276911529 |
| PEPE / USDT | uniswap_v2 | 0xc571...319a | 0.000265651376789677 |
| PEPE / WETH 1% | uniswap_v3 | 0x757a...5b72 | 0.000258921675850027 |
| pepecoin / PEPE 0.3% | uniswap-v4-ethereum | 0x886a...7b92 | 0.000260001164183659 |
| PEPE / ETH 0.3% | uniswap-v4-ethereum | 0x1ad0...382d | 0.000265181761218261 |
| WOOF / PEPE | uniswap_v2 | 0x81c5...32a4 | 0.0002843434276 |
| PEPE / WETH | x7-finance | 0x7547...cc7e | 0.0005431970247 |
| PEPE / ETH 0.01% | uniswap-v4-ethereum | 0xdc16...8c37 | 0.0003716356664 |
| KEK / PEPE | uniswap_v2 | 0x7af7...85d9 | 0.0004237566847 |
| pepecoin / PEPE | uniswap_v2 | 0xe072...e601 | 0.0004260400218 |
| test / PEPE | uniswap_v2 | 0x525b...6e8c | 0.0017469038985208 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.