| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| AKT / WETH | dodo-pmm-ethereum | 0x31aa...511e | 4.7027822633 |
| AKT / USDT 8% | uniswap-v4-ethereum | 0x4b48...f4fc | 4.9302810094 |
| AKT / USDT 10% | uniswap-v4-ethereum | 0xd7b0...e9e5 | 5.0470620001 |
| AKT / erowan | sushiswap | 0x8f84...0e2f | 5.0497614622 |
| AKT / USDT 50% | uniswap-v4-ethereum | 0xd29f...330d | 1.5443392982 |
| AKT / WETH | dodo-pmm-ethereum | 0xda37...3027 | 3.9352276342 |
| erowan / AKT 0.3% | uniswap_v3 | 0xd282...3a3c | 0.311119446862987 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.