| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ASTR / USDT 12% | uniswap-v4-ethereum | 0x0c82...6695 | 0.009407956966 |
| ASTR / ETH 0.3% | uniswap-v4-ethereum | 0xf58a...9921 | 0.008720202895 |
| ASTR / wstETH 0.3% | uniswap-v4-ethereum | 0x927b...2506 | 0.009346053669 |
| ASTR / USDT 13.21% | uniswap-v4-ethereum | 0xaa14...cfcf | 0.007711309404 |
| ASTR / USDT 5% | uniswap-v4-ethereum | 0xdb30...a328 | 0.009388581188 |
| ASTR / USDT 4.99% | uniswap-v4-ethereum | 0x0039...73d9 | 0.007554457223 |
| ASTR / USDT 26% | uniswap-v4-ethereum | 0x891f...c032 | 0.008729481509 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.