| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| PNUT / WETH | uniswap_v2 | 0x5292...5dd8 | 0.00528513370874835 |
| PNUT / WETH 1% | uniswap_v3 | 0x42da...0004 | 0.172827514 |
| PNUT / WETH 0.3% | uniswap_v3 | 0xb986...a674 | 0.287120147793803 |
| Neiro / PNUT 1% | uniswap_v3 | 0x50bb...fca6 | 0.165702001365823 |
| PEANUT / PNUT 1% | uniswap_v3 | 0xd083...9705 | 0.213950264863832 |
| FRED / PNUT 1% | uniswap_v3 | 0xfe13...7f32 | 0.00634906053840295 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.