| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| MEME / WETH | uniswap_v2 | 0x5dfb...a583 | 8.53217537041679 |
| MEME / WETH 0.3% | uniswap_v3 | 0x564a...89f5 | 84.5841902928016101971625250978 |
| MEME / WETH | shibaswap | 0x50b2...fd24 | 8.75578781273294 |
| MEME / WETH | sushiswap | 0x17b3...9846 | 8.6167138011 |
| MEME / SOTU | uniswap_v2 | 0x5e8a...daf0 | 8.653069539 |
| MEME / NDR | uniswap_v2 | 0x1e6d...3577 | 18.6962513807 |
| JIAOZI / MEME | uniswap_v2 | 0x17ee...9280 | 22.7478448 |
| GALAXY / MEME | uniswap_v2 | 0x37c0...b623 | 17.2494515366 |
| FAIR / MEME | uniswap_v2 | 0x80da...0a18 | 14.8955052429 |
| MEME / USDT 1% | uniswap_v3 | 0x1bc7...65bc | 778.6913369189 |
| MEME / UNI | sushiswap | 0xf684...607b | 72.2860937938 |
| MEME / DAI | uniswap_v2 | 0x504c...a569 | 1.5847719136 |
| MEME / UNI | uniswap_v2 | 0xd456...25a7 | 26.2071580292 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.