| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| LYM / WETH | uniswap_v2 | 0x80dd...439e | 0.000174061013842912 |
| LYM / WETH | sushiswap | 0x913e...5ebb | 0.0001754571352 |
| LYM / LMT | uniswap_v2 | 0x5539...f7eb | 0.0001819989124 |
| LYM / REVV | uniswap_v2 | 0x503e...2299 | 0.0001828612125 |
| LYM / PROS | sushiswap | 0x3e36...876f | 0.0001797906119 |
| LYM / TOWER | sushiswap | 0x6406...4e53 | 0.000175450985992862 |
| LYM / BONDLY | sushiswap | 0x9f59...72f2 | 0.0002478438824 |
| LYM / REVV | sushiswap | 0xb3f1...c1cb | 0.0001682506217 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.