| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| TSUKA / USDC | uniswap_v2 | 0x67ce...f33c | 0.00190471391760238 |
| ODIN / TSUKA | uniswap_v2 | 0xc037...c6e6 | 0.00187629105936681 |
| BEARDY / TSUKA 1% | uniswap_v3 | 0x5f1b...e53e | 0.00190202529933601 |
| TSUKA / 転生 1% | uniswap_v3 | 0xde75...7852 | 0.00190597855790612 |
| TSUKA / ETH 0.3% | uniswap-v4-ethereum | 0xc6e6...d1e4 | 0.00187881028908327 |
| Dream / TSUKA | uniswap_v2 | 0x7a6f...6c47 | 0.00190720396725622 |
| BEARDY / TSUKA | uniswap_v2 | 0x3aa3...f7ed | 0.00190479459234796 |
| Test / TSUKA 1% | uniswap-v4-ethereum | 0x6fab...b69a | 0.005306154997 |
| TSUKA / ODIN 0.25% | uniswap-v4-ethereum | 0xaa5b...f7e1 | 0.003592714423 |
| TSUKA / WETH 1% | uniswap_v3 | 0x6297...695c | 0.0017869647434501 |
| FREE / TSUKA | uniswap_v2 | 0xc734...6141 | 0.002518605891 |
| ZENI / TSUKA | uniswap_v2 | 0xb60e...5c4a | 0.00189036379821959 |
| IRNBNK / TSUKA | uniswap_v2 | 0x0ac9...c21f | 0.001700937882 |
| TSUKA / BAE | uniswap_v2 | 0xf0ad...58e2 | 0.002841282058 |
| SHIB / TSUKA | uniswap_v2 | 0x6dca...cca3 | 0.00188395576707623 |
| TSUKA / WETH | uniswap_v2 | 0xa1af...20b8 | 0.00183190687287868 |
| TSUKA / ETH 1% | uniswap-v4-ethereum | 0x87a0...e91b | 0.00179769135240055 |
| hOHM / TSUKA 0.25% | uniswap-v4-ethereum | 0xf252...db3d | 0.003699621303 |
| DAPF / TSUKA 0.3% | uniswap_v3 | 0x1c78...fe01 | 0.001864052195 |
| TSUKA / WETH | sushiswap | 0x6167...dc3c | 0.00217849403609903 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.