| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| JANET / WETH | uniswap_v2 | 0x6a10...832c | 0.00007376016265 |
| rust / JANET 1% | uniswap-v4-ethereum | 0x74b4...fccf | 0.0000738233602066402 |
| Mog / JANET 1% | uniswap-v4-ethereum | 0x567c...9d2d | 0.00009341853289 |
| USDC / JANET 1% | sushiswap-v3-ethereum | 0x5ae8...31f7 | 0.0189764949338853 |
| USDT / JANET | uniswap_v2 | 0x5201...6656 | 0.0001329194295 |
| JANET / WETH 1% | uniswap_v3 | 0x8f62...c5fe | 0.00832807603879753 |
| USDT / JANET 0.01% | uniswap-v4-ethereum | 0xd1af...b316 | 0.0003168482633 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.