| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| Mika / WETH 1% | uniswap_v3 | 0x1139...1af3 | 0.00000007303649334 |
| Mika / SLACK | uniswap_v2 | 0x6d93...eeda | 0.00000007343033108 |
| Mika / WETH | uniswap_v2 | 0x7093...4186 | 0.00000007472312595 |
| TrumpBucks / Mika | uniswap_v2 | 0x7fe3...be35 | 0.0000000757987361703279 |
| APE2 / Mika 1% | uniswap_v3 | 0xbade...00a3 | 0.00000007260713749 |
| TrumpBucks / Mika 1% | uniswap_v3 | 0xdfdc...a3aa | 0.00000007382566131707 |
| EVERMOON / Mika | uniswap_v2 | 0x25c2...c2cd | 0.0000000680978263643488 |
| Anaruboshi / Mika | uniswap_v2 | 0x88e8...9182 | 0.0000000748613253545676 |
| KEKO / Mika | uniswap_v2 | 0x8316...9c97 | 0.0000000738479390762327 |
| CABAL / Mika | uniswap_v2 | 0xbdbb...a12c | 0.00000007152976678 |
| BoysClub / Mika | uniswap_v2 | 0x32d1...15f7 | 0.00000007212696268 |
| Mika / PEPE | uniswap_v2 | 0xac5b...5a99 | 0.0000000933036291396112 |
| PEPE / Mika | uniswap_v2 | 0x9368...a571 | 0.000000186571839870064 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.