| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| CLUTCH / WETH | uniswap_v2 | 0xb49e...c170 | 0.0006578156158 |
| CLUTCH / ETH 10% | uniswap-v4-ethereum | 0xe79f...f845 | 0.0006017086712 |
| CLUTCH / ETH 50% | uniswap-v4-ethereum | 0xaecb...495e | 0.0007945078853 |
| CLUTCH / USDC 28% | uniswap-v4-ethereum | 0x52d0...f459 | 0.0005055766652 |
| CLUTCH / USDC 30% | uniswap-v4-ethereum | 0xff34...72d9 | 0.0004686036067 |
| CLUTCH / ETH 15% | uniswap-v4-ethereum | 0x0786...f03b | 0.0003898741705 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.