| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| BERRY / WETH 1% | uniswap_v3 | 0xdd94...cc8d | 0.0216325736977282 |
| mBERRY / BERRY 1% | uniswap_v3 | 0xb6b6...f74b | 0.03189888554 |
| BERRY / ETH 1% | uniswap-v4-ethereum | 0x76ef...3fcd | 0.02809452616 |
| BERRY / KABOSU | uniswap_v2 | 0x6c5e...4340 | 0.1020722842 |
| BERRY / USDT 1% | uniswap-v4-ethereum | 0xbd57...5c42 | 0.02636639963 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.