| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| AVI / ETH 0.5% | uniswap-v4-ethereum | 0x3fc0...b31e | 0.000226282272922385 |
| AVI / WETH 1% | uniswap_v3 | 0x9f48...94f2 | 0.0002575066949 |
| AVI / ETH 0.3% | uniswap-v4-ethereum | 0x7e32...f683 | 0.000253420888 |
| AVI / WETH 0.3% | uniswap_v3 | 0x4607...8bab | 0.0002772804832 |
| AVI / WETH | uniswap_v2 | 0x460b...6b84 | 0.0004480464801 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.