| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ICSA / HEX | uniswap_v2 | 0xbaaf...6b41 | 0.003769332819 |
| HDRN / ICSA 1% | uniswap_v3 | 0x4676...fb07 | 0.00381578768265668 |
| COM / ICSA | 9inch-ethereum | 0xaac9...07bc | 0.00372438522346274 |
| ICSA / USDC 1% | uniswap_v3 | 0x3aaf...9ab7 | 0.003699787606 |
| ICSA / WETH 1% | uniswap_v3 | 0xecac...af3b | 0.03226934788 |
| HEX / ICSA 1% | uniswap_v3 | 0x82de...ad03 | 0.003039607249 |
| HEX / ICSA 0.3% | uniswap_v3 | 0xff62...0fa5 | 0.07433296518 |
| USDC / ICSA 1% | uniswap-v4-ethereum | 0x5121...cb22 | 0.04231011066 |
| ICSA / ETH 1% | uniswap-v4-ethereum | 0xfc7a...a1f7 | 0.003551511779 |
| ICSA / WETH | uniswap_v2 | 0x11cb...4aab | 0.003256040616 |
| HDRN / ICSA | uniswap_v2 | 0xc381...7355 | 0.003110000711 |
| TRIO / ICSA 0.3% | uniswap_v3 | 0x56eb...33cb | 0.527519311515156003183521117508953771682930252 |
| DECI / ICSA 1% | uniswap_v3 | 0xa2c5...fa38 | 0.636404314195357414076862696181 |
| DECI / ICSA 0.3% | uniswap_v3 | 0xaef3...a62a | 0.4555081566992957904262955106026559613463577375 |
| POLY / ICSA 1% | uniswap_v3 | 0x7d85...2f24 | 0.0324112940528677 |
| TEAM / ICSA 0.3% | uniswap_v3 | 0x2f0c...c581 | 0.0179879582507317 |
| PLSD / ICSA 1% | uniswap_v3 | 0x316b...b75b | 0.0304678668457527 |
| LUCKY / ICSA 1% | uniswap_v3 | 0xbdc2...d0f5 | 0.0244114642625344 |
| AXIS / ICSA | uniswap_v2 | 0x1ea6...8a1d | 0.0378220957702014 |
| ICSA / ICSA | uniswap_v2 | 0xe811...5a42 | 0.0291370561 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.