| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| puppies / WETH | uniswap_v2 | 0x2325...c0d4 | 0.000000230725752259266 |
| Marvin / puppies | uniswap_v2 | 0x0d45...89c8 | 0.000000231007595813585 |
| Peke / puppies | uniswap_v2 | 0xe14e...530c | 0.000000245504600505183 |
| puppies / ETH 90% | uniswap-v4-ethereum | 0xd10e...ad41 | 0.00000001235557244 |
| puppies / ETH 89.999% | uniswap-v4-ethereum | 0x1410...a035 | 0.00000002369779877 |
| x402 / puppies 0.25% | pancakeswap-v3-ethereum | 0xe440...0758 | 0.000000196986262487511 |
| MARVIN / puppies 0.3% | uniswap-v4-ethereum | 0xaaea...161e | 0.0000006000936505 |
| SCAM / puppies | uniswap_v2 | 0xa821...65a4 | 0.0000005881261751 |
| KABOSU / puppies | uniswap_v2 | 0x15b2...08f4 | 0.000000187416517 |
| MARVIN / puppies | uniswap_v2 | 0x012b...b5f7 | 0.0000005890129594 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.