| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| TRIBE / FEI | uniswap_v2 | 0x9928...590a | 0.473712900113724 |
| TRIBE / WETH 1% | uniswap_v3 | 0xe2c5...32ef | 0.478523179560215 |
| TRIBE / WETH | uniswap_v2 | 0x7ce0...02eb | 0.474977621158377 |
| TRIBE / FEI 0.3% | uniswap_v3 | 0xd414...0cb7 | 0.475470755949884 |
| TRIBE / WETH 0.3% | uniswap_v3 | 0xf87b...8364 | 0.473906780412827 |
| TRIBE / FEI 0.05% | uniswap_v3 | 0x4eb9...3107 | 0.4815767711 |
| TRIBE / USDC 1% | uniswap_v3 | 0xf275...93c4 | 0.4986427398 |
| TRIBE / FEI | sakeswap | 0x85e7...e3d6 | 0.3398951195 |
| TRIBE / UNI 0.05% | uniswap_v3 | 0x1078...f9b7 | 0.3403793759 |
| TRIBE / USDC 0.3% | uniswap_v3 | 0xc92b...2a2b | 0.8750366081 |
| TRIBE / WETH | sakeswap | 0x2349...df33 | 0.0000104396444 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.