| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ATRI / WETH | uniswap_v2 | 0xc4d9...2a00 | 0.0001327852694 |
| ATRI / WETH 1% | uniswap_v3 | 0xb2f8...0cc2 | 0.0051547699244195 |
| ATRI / ETH 0.3% | uniswap-v4-ethereum | 0x5cac...c16c | 0.000127597085 |
| ATRI / WETH 0.3% | uniswap_v3 | 0xcdb0...fd93 | 0.000610353366804056 |
| ATRI / USDC | uniswap_v2 | 0xd81e...f008 | 0.00351247930466421 |
| ATRI / USDT | uniswap_v2 | 0x26fd...0305 | 0.0001958733619 |
| ATRI / TOWER | uniswap_v2 | 0xf841...8128 | 0.0035680044764580192186481324398978767791573300662386717545783717801259998106062079374402176 |
| ATRI / LYM | uniswap_v2 | 0xfaa5...51ae | 0.0035680044764580192186481324398978767791573300662386717545783717801259998106062079374402176 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.