| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ODIN / ETH 0.3% | uniswap-v4-ethereum | 0xf080...007e | 0.00313532549790332 |
| crypto / ODIN 0.25% | uniswap-v4-ethereum | 0x6a5c...8f4b | 0.00312268369427134 |
| ODIN / WETH | uniswap_v2 | 0x01db...26cb | 0.00313974621946277 |
| ODIN / TSUKA | uniswap_v2 | 0xc037...c6e6 | 0.00315680140956827 |
| ODIN / WBTC | uniswap_v2 | 0xad67...01a0 | 0.00312892128237378 |
| PAXG / ODIN | uniswap_v2 | 0x2808...4892 | 0.00311617577203239 |
| OHM / ODIN | uniswap_v2 | 0x08b3...b08d | 0.003101999330525 |
| APU / ODIN | uniswap_v2 | 0x37c7...745c | 0.00313318264219397 |
| ODIN / DAI | uniswap_v2 | 0x6c02...64fe | 0.00316239524050828 |
| PEAS / ODIN | uniswap_v2 | 0xbaf9...2f51 | 0.00311617577203239 |
| ODIN / LINK | uniswap_v2 | 0x62cb...553f | 0.00313986406042413 |
| SHIB / ODIN | uniswap_v2 | 0x3feb...61d1 | 0.00315623605652907 |
| SKOL / ODIN | uniswap_v2 | 0xaded...a17a | 0.00313344813117746 |
| OHMI / ODIN | uniswap_v2 | 0xddf3...e2ab | 0.00315564189063528 |
| APE / ODIN | uniswap_v2 | 0xfa7e...a18d | 0.00315564189063528 |
| TrumpBucks / ODIN 1% | uniswap-v4-ethereum | 0x875b...17a8 | 0.00306750735696858 |
| WAIT / ODIN | uniswap_v2 | 0x348b...3d79 | 0.00315261371493809 |
| DBI / ODIN | uniswap_v2 | 0x97ee...d09e | 0.00312940060783773 |
| BEARDY / ODIN | uniswap_v2 | 0x2ef2...c751 | 0.00313102697973026 |
| SOJ / ODIN | uniswap_v2 | 0x4409...24b9 | 0.007387806007 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.