| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| BEAR / WETH | uniswap_v2 | 0xf15b...77ce | 0.00284564973172525 |
| BEAR / ETH 6% | uniswap-v4-ethereum | 0x07d5...0305 | 0.00284505296266871 |
| BEAR / ETH 2% | uniswap-v4-ethereum | 0x9d26...befe | 0.008263835777 |
| BEAR / ETH 2.5% | uniswap-v4-ethereum | 0x77b5...07af | 0.01050123779 |
| BEAR / ETH 1% | uniswap-v4-ethereum | 0x2ede...af37 | 0.008153115275 |
| BEAR / ETH 2.34% | uniswap-v4-ethereum | 0x57a1...06ec | 0.009363882305 |
| BEAR / ETH 0.05% | uniswap-v4-ethereum | 0x2ab5...d0da | 0.004750708239 |
| BEAR / ETH 2.2% | uniswap-v4-ethereum | 0xcddf...e93e | 0.02586951152 |
| BEAR / ETH 1.99% | uniswap-v4-ethereum | 0x6f7e...31c0 | 0.00309840618649441 |
| KEKIUS / BEAR 6.66% | uniswap-v4-ethereum | 0x5eab...07e2 | 0.00261889701447071 |
| BEAR / WETH 1% | uniswap_v3 | 0x2330...e564 | 0.01021860558 |
| GROK420 / BEAR 1% | uniswap_v3 | 0x04bf...1824 | 0.00308447577997928 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.