| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| INS / WETH 0.3% | uniswap_v3 | 0xdf71...4f03 | 0.00377105208951597 |
| INS / USDT 0.05% | uniswap_v3 | 0x7c47...8e6a | 0.279919429495357 |
| INS / USDT 1% | uniswap_v3 | 0xe881...9f8e | 0.653924408396585 |
| INS / WETH 1% | uniswap_v3 | 0x2ebc...9b23 | 1.35627838236074 |
| INS / USDT 0.01% | uniswap_v3 | 0x9572...4270 | 0.654510207235506 |
| INS / USDT 0.3% | uniswap_v3 | 0xbbd2...da9b | 0.672992458404905 |
| INS / WETH 0.05% | uniswap_v3 | 0xa7d1...7c9b | 0.579013860419757 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.