| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| TVK / WETH | uniswap_v2 | 0x0f5a...5b2a | 0.00291752309365076 |
| TVK / SOTU | uniswap_v2 | 0xb9ba...2a9a | 0.00292276812984908 |
| TVK / USDT 93% | uniswap-v4-ethereum | 0x123c...033e | 0.01693805176 |
| VANRY / TVK 20% | uniswap-v4-ethereum | 0xbba3...ff54 | 0.002166260045 |
| TVK / ALBT | uniswap_v2 | 0x23ba...5bcc | 0.00272506370550853 |
| USDC / TVK 9% | uniswap-v4-ethereum | 0xbae1...c065 | 0.003130846468 |
| USDC / TVK 88% | uniswap-v4-ethereum | 0xf3b6...9cbf | 0.0009103589977 |
| TVK / WETH 1% | uniswap_v3 | 0xa40c...fc7b | 0.0493943329483678 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.