| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| VYPER / DRAGONX 1% | uniswap_v3 | 0x214c...457f | 0.000109627140201574 |
| VYPER / VOLT 1% | uniswap_v3 | 0xbf0c...1a4b | 0.000110629505717743 |
| VYPER / SHOGUN | uniswap_v2 | 0x6062...baad | 0.000100233676118226 |
| VYPER / ELMNT | uniswap_v2 | 0xa04c...acda | 0.0002068558885 |
| VYPER / WETH 1% | uniswap_v3 | 0xf169...d64f | 0.01019838561 |
| WOJAK / VYPER 1% | uniswap_v3 | 0x67ca...8ad2 | 0.0009887798571 |
| TBTC / VYPER | uniswap_v2 | 0x5361...d686 | 0.0005892213189 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.