| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| KABOSU / WETH | uniswap_v2 | 0x4576...6b79 | 0.00000104318899141648 |
| Neiro / KABOSU | uniswap_v2 | 0x6a51...4efc | 0.00000103184791936463 |
| TURBO / KABOSU | uniswap_v2 | 0x1599...91e8 | 0.00000104649920229254 |
| MHRD / KABOSU | uniswap_v2 | 0x35c8...83ac | 0.00000104330574274872 |
| USDC / KABOSU | uniswap_v2 | 0x876a...b5c7 | 0.00000104225846904663 |
| MOODENG / KABOSU | uniswap_v2 | 0xec19...99f0 | 0.00000103758818000102 |
| CVC / KABOSU | uniswap_v2 | 0x46d9...98ab | 0.00000104341905621983 |
| SD / KABOSU | uniswap_v2 | 0x856f...be19 | 0.00000103306323331139 |
| FLUX / KABOSU | uniswap_v2 | 0x8389...e9af | 0.00000103145705104112 |
| SPELL / KABOSU | uniswap_v2 | 0xf234...4975 | 0.000001046265055975 |
| BAT / KABOSU | uniswap_v2 | 0x8307...7227 | 0.00000104661463156703 |
| DOGE / KABOSU | uniswap_v2 | 0x54cc...0dfc | 0.00000104853589916778 |
| TERMINUS / KABOSU | uniswap_v2 | 0x016c...8f27 | 0.00000104743453330951 |
| DENT / KABOSU | uniswap_v2 | 0x6082...4dd1 | 0.00000103019816988874 |
| CPOOL / KABOSU | uniswap_v2 | 0x8b74...27ec | 0.00000103184791936463 |
| PNKSTR / KABOSU | uniswap_v2 | 0xe9be...0308 | 0.00000102660788012661 |
| SPK / KABOSU | uniswap_v2 | 0x25e6...b3f0 | 0.00000103183966573553 |
| KABOSU / AMP | uniswap_v2 | 0x1327...ebdb | 0.00000104639079362743 |
| KABOSU / DOGE2.0 | uniswap_v2 | 0x1f9e...9227 | 0.00000103747342937642 |
| LQTY / KABOSU | uniswap_v2 | 0xe98e...6b1a | 0.00000104674207154423 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.