| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| TREAT / USDC | uniswap_v2 | 0x1002...67cb | 0.000140010246361924 |
| TREAT / WETH 1% | uniswap_v3 | 0xd739...6f1c | 0.000141524461983812 |
| SHIB / TREAT | shibaswap | 0x66ef...b67b | 0.000137804659045487 |
| hope / TREAT | shibaswap | 0xa4c1...301b | 0.000142139584561505 |
| UNITY / TREAT | shibaswap | 0x9f1a...bb22 | 0.000142184737220189 |
| USDC / TREAT 1% | uniswap-v4-ethereum | 0xaf01...d6bc | 0.000146597595293395 |
| SHI / TREAT | shibaswap | 0x5b02...6ede | 0.000133459118799357 |
| TREAT / WBTC 1% | uniswap-v4-ethereum | 0x4c9e...a61c | 0.000131140912315757 |
| PawZ / TREAT | shibaswap | 0x6f04...dcc9 | 0.000142240665565077 |
| HACHI / TREAT 1% | uniswap-v4-ethereum | 0x2dc4...d357 | 0.000135443270579881 |
| TREAT / WETH | shibaswap | 0x2ff4...d5ed | 0.000143735511923404 |
| BONE / TREAT | shibaswap | 0x8e5e...a381 | 0.000141499959220044 |
| WAKEUP / TREAT | shibaswap | 0x3b72...a2a8 | 0.000136420397910526 |
| FUND / TREAT 1% | uniswap-v4-ethereum | 0xe33f...b4aa | 0.000141834745103023 |
| SHI / TREAT 1% | uniswap_v3 | 0xa54d...da09 | 0.000132773401288052 |
| PawZ / TREAT 1% | uniswap-v4-ethereum | 0x3682...2a3e | 0.000140380485911686 |
| HACHI / TREAT | shibaswap | 0xc4bd...94e7 | 0.000136615276553629 |
| XMONEY / TREAT 1% | uniswap-v4-ethereum | 0x8379...ed76 | 0.000134446440466829 |
| CHI / TREAT 1% | uniswap-v4-ethereum | 0xa70a...0e7a | 0.00013312500363219 |
| WLFI / TREAT 1% | uniswap-v4-ethereum | 0x4af8...6964 | 0.000140678928544615 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.