| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| PIKA / USDT | uniswap_v2 | 0x43a6...418d | 0.000000915527266066315 |
| PIKA / WETH | uniswap_v2 | 0xc9b0...63ac | 0.000000801247610188592 |
| PIKA / USDT 50% | uniswap-v4-ethereum | 0x55ca...b04a | 0.0000007779059631 |
| USDC / PIKA 88% | uniswap-v4-ethereum | 0x04f3...f8d2 | 0.0000007892087086 |
| SHIB / PIKA | uniswap_v2 | 0x213a...cd2c | 0.000001020492001 |
| PIKA / USDC | uniswap_v2 | 0xe711...ef5f | 0.0000002203310743 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.