| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| crypto / ODIN 0.25% | uniswap-v4-ethereum | 0x6a5c...8f4b | 0.00172028844663079 |
| ODIN / WETH | uniswap_v2 | 0x01db...26cb | 0.00169845031847333 |
| ODIN / TSUKA | uniswap_v2 | 0xc037...c6e6 | 0.00172298579687018 |
| PAXG / ODIN | uniswap_v2 | 0x2808...4892 | 0.0017287481109149 |
| ODIN / WBTC | uniswap_v2 | 0xad67...01a0 | 0.00172531657781581 |
| ODIN / DAI | uniswap_v2 | 0x6c02...64fe | 0.00171940554148946 |
| PEAS / ODIN | uniswap_v2 | 0xbaf9...2f51 | 0.00174339327921373 |
| OHM / ODIN | uniswap_v2 | 0x08b3...b08d | 0.00176890179303826 |
| APU / ODIN | uniswap_v2 | 0x37c7...745c | 0.00178204092061935 |
| SHIB / ODIN | uniswap_v2 | 0x3feb...61d1 | 0.00174338160396078 |
| ODIN / LINK | uniswap_v2 | 0x62cb...553f | 0.00174939652622399 |
| SKOL / ODIN | uniswap_v2 | 0xaded...a17a | 0.00179662308230688 |
| OHMI / ODIN | uniswap_v2 | 0xddf3...e2ab | 0.00178678980397259 |
| APE / ODIN | uniswap_v2 | 0xfa7e...a18d | 0.00172481787731283 |
| TrumpBucks / ODIN 1% | uniswap-v4-ethereum | 0x875b...17a8 | 0.00177146653139803 |
| SOJ / ODIN | uniswap_v2 | 0x4409...24b9 | 0.003264157474 |
| APU / ODIN 0.25% | uniswap-v4-ethereum | 0xb29b...8bfb | 0.007279161192 |
| TSUKA / ODIN 0.25% | uniswap-v4-ethereum | 0xaa5b...f7e1 | 0.00554415821 |
| WAIT / ODIN | uniswap_v2 | 0x348b...3d79 | 0.00176431429044099 |
| ODIN / ETH 0.3% | uniswap-v4-ethereum | 0xf080...007e | 0.002062315451 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.