| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| pumpBTC / WBTC | curve | 0xea65...eea0 | 86147.6112200916 |
| USDC / pumpBTC 66.66% | uniswap-v4-ethereum | 0x8a04...3010 | 25890.2490054497 |
| pumpBTC / WBTC | uniswap_v2 | 0x4974...819d | 22772.5757012061 |
| pumpBTC / WBTC 0.05% | uniswap_v3 | 0x6f5e...7d90 | 84021.9253929234 |
| pumpBTC / WBTC 0.3% | uniswap_v3 | 0x4292...22de | 64171.0055722571 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.