| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| BEAR / WETH | uniswap_v2 | 0xf15b...77ce | 0.0143631610065933 |
| BEAR / ETH 0.05% | uniswap-v4-ethereum | 0x2ab5...d0da | 0.0146159191394285 |
| BEAR / WETH 1% | uniswap_v3 | 0x2330...e564 | 0.0143026337054735 |
| BEAR / ETH 2% | uniswap-v4-ethereum | 0x9d26...befe | 0.0144279310831224 |
| BEAR / ETH 1% | uniswap-v4-ethereum | 0x2ede...af37 | 0.0144919386071727 |
| BEAR / ETH 6% | uniswap-v4-ethereum | 0x07d5...0305 | 0.0131751036797101 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.