| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| KEROSENE / WETH | uniswap_v2 | 0x34a4...a7b4 | 0.0002267223365 |
| KEROSENE / WETH 1% | uniswap_v3 | 0x82a5...cb25 | 0.07108633951 |
| KEROSENE / USDC 1% | uniswap_v3 | 0xc61c...a083 | 0.11823931473329 |
| KEROSENE / WETH 0.3% | uniswap_v3 | 0x905f...f9a0 | 0.01050582004 |
| KEROSENE / DYAD 0.3% | uniswap_v3 | 0x1c27...8c52 | 0.119864142408386 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.