| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ETHEREUM / WETH | uniswap_v2 | 0x5f53...29ef | 0.0000901650391077908 |
| BITCOIN / ETHEREUM 1% | uniswap_v3 | 0x213b...df56 | 0.0000895670084853682 |
| ETHEREUM / WETH 1% | uniswap_v3 | 0x7c31...3da9 | 0.000355999725603719 |
| SCHIZO / ETHEREUM | uniswap_v2 | 0x2a84...3ac6 | 0.000571421630390653 |
| BITCOIN / ETHEREUM | uniswap_v2 | 0x2aba...5058 | 0.000305113598354523 |
| SCHIZO / ETHEREUM | uniswap_v2 | 0xda6b...6d39 | 0.000308787444753721 |
| SCHIZO / ETHEREUM 1% | uniswap_v3 | 0xa6fd...a512 | 0.000603556389036555 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.