| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| BEPRO / WETH | uniswap_v2 | 0x51c1...ed89 | 0.0000127815648001566 |
| BEPRO / ETH 0.3% | uniswap-v4-ethereum | 0x59a6...e4a9 | 0.0000115693285298624 |
| USDC / BEPRO 1% | uniswap-v4-ethereum | 0x4c0f...4c5e | 0.0000125027228551132 |
| BEPRO / WETH 0.3% | uniswap_v3 | 0x695b...485c | 0.0000220768626 |
| USDC / BEPRO 88% | uniswap-v4-ethereum | 0x7f77...1107 | 0.000008961810201 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.