| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| T / WETH | curve | 0x752e...aeac | 0.00848824226753933 |
| T / USDC 1% | uniswap_v3 | 0x520e...8e37 | 0.0085806632788341 |
| T / WETH 0.3% | balancer_ethereum | 0x8167...e967 | 0.00886760006004976 |
| tBTC / T 0.5% | balancer_ethereum | 0x6228...f6fb | 0.00876986880596754 |
| T / KABOSU | uniswap_v2 | 0x301c...485e | 0.00863283593163618 |
| T / WETH 1% | uniswap_v3 | 0x286e...6c86 | 0.05746454241 |
| T / WBTC 1% | uniswap_v3 | 0x8544...9806 | 0.02229705941 |
| T / WETH | uniswap_v2 | 0xd3fb...dfdc | 0.00934338086114977 |
| T / WBTC 0.3% | uniswap_v3 | 0xe566...7a0e | 0.0254526425 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.