| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| DOGS / WETH | uniswap_v2 | 0xc681...0239 | 0.000007793086731 |
| DOGS / ETH 3% | uniswap-v4-ethereum | 0x8181...bcfb | 0.000472213739 |
| DOGS / ETH 0.05% | uniswap-v4-ethereum | 0x4c83...3d90 | 0.0002795654407 |
| DOGS / ETH 0.01% | uniswap-v4-ethereum | 0xaf82...7a12 | 0.0003253119966 |
| BIGGIE / DOGS 3% | uniswap-v4-ethereum | 0xd491...c198 | 0.00007140112646 |
| DOGS / WETH 0.3% | uniswap_v3 | 0xc96b...8922 | 0.0005637407162 |
| DOGS / ETH 1% | uniswap-v4-ethereum | 0x371a...ac8c | 0.0003653471362 |
| DOGS / ETH 0.3% | uniswap-v4-ethereum | 0x6c95...ea96 | 0.0003139847585 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.