| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| TSUKA / USDC | uniswap_v2 | 0x67ce...f33c | 0.001168833607 |
| ODIN / TSUKA | uniswap_v2 | 0xc037...c6e6 | 0.00116726187369184 |
| BEARDY / TSUKA 1% | uniswap_v3 | 0x5f1b...e53e | 0.00117296174819774 |
| TSUKA / 転生 1% | uniswap_v3 | 0xde75...7852 | 0.001176334146 |
| TSUKA / ETH 0.3% | uniswap-v4-ethereum | 0xc6e6...d1e4 | 0.001191291559 |
| ZENI / TSUKA | uniswap_v2 | 0xb60e...5c4a | 0.00116473311369897 |
| TSUKA / WETH | uniswap_v2 | 0xa1af...20b8 | 0.0012720761 |
| Test / TSUKA 1% | uniswap-v4-ethereum | 0x6fab...b69a | 0.005306154997 |
| TSUKA / USDC 0.05% | uniswap_v3 | 0x4ae1...4f17 | 0.0497023105870943211622529867774 |
| TSUKA / ODIN 0.25% | uniswap-v4-ethereum | 0xaa5b...f7e1 | 0.003592714423 |
| TSUKA0.5 / TSUKA | uniswap_v2 | 0xc23e...a3d0 | 0.0560031037531057503475487090825977505691241322463563052272092911342144061132495817075724518 |
| TSUKA / WETH 1% | uniswap_v3 | 0x6297...695c | 0.001185306858 |
| BEARDY / TSUKA 1% | uniswap_v3 | 0x350a...6285 | 0.0198432415738072 |
| FREE / TSUKA | uniswap_v2 | 0xc734...6141 | 0.002518605891 |
| Dream / TSUKA | uniswap_v2 | 0x7a6f...6c47 | 0.00117098720569294 |
| VALIDATE / TSUKA | uniswap_v2 | 0x0633...49d7 | 0.0713221308194771228549691746004543848324753034182795285636588631837367446045238339572101664 |
| IRNBNK / TSUKA | uniswap_v2 | 0x0ac9...c21f | 0.001700937882 |
| TSUKA / FENRIR | uniswap_v2 | 0x5cfa...b44f | 0.001214455409 |
| SHIB / TSUKA | uniswap_v2 | 0x6dca...cca3 | 0.0012132396208131 |
| BEARDY / TSUKA | uniswap_v2 | 0x3aa3...f7ed | 0.001272706701 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.