| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| DOGC / WETH | uniswap_v2 | 0x833b...628b | 0.00000700937878411488 |
| USDT / DOGC 88% | uniswap-v4-ethereum | 0x3a97...ff62 | 0.000005120062878 |
| DOGC / ETH 0.01% | uniswap-v4-ethereum | 0x02a0...ad0e | 0.0000528896099 |
| DOGC / ETH 1% | uniswap-v4-ethereum | 0xeae6...ec94 | 0.00006520721598 |
| MNTO / DOGC 1% | pancakeswap-v3-ethereum | 0x75c9...b37d | 0.00001920956964 |
| USDT / DOGC | uniswap_v2 | 0x9adf...b624 | 0.00004135710719 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.