| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| CROWN / USDT 99.991% | uniswap-v4-ethereum | 0x548a...8be6 | 0.1466086443 |
| CROWN / USDC 99.5% | uniswap-v4-ethereum | 0xeeb9...11bf | 0.0004892541751 |
| USDC / CROWN 99% | uniswap-v4-ethereum | 0x8773...41a9 | 0.007307352867 |
| USDC / CROWN 99.001% | uniswap-v4-ethereum | 0x66c6...750f | 92.2390687551423 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.