| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| PROM / USDT 0.3% | uniswap_v3 | 0x3902...fe67 | 1.1005450547 |
| PROM / WETH | uniswap_v2 | 0x544b...af85 | 1.0944080627 |
| USDT / PROM 85% | uniswap-v4-ethereum | 0x7003...d6e8 | 1.02146462899967 |
| SDEX / PROM 1% | uniswap_v3 | 0x5dad...69a7 | 12.4303424506256 |
| PROM / USDC 0.3% | uniswap_v3 | 0x4b3f...58a5 | 2208722435391.980820469414945054723615378003909684968 |
| PROM / USDC | uniswap_v2 | 0x3b44...da4d | 6.0406755233032085870925247830441506918447675842658235388447738199669692710713395727344966677094843650432 |
| KABOSU / PROM | uniswap_v2 | 0x770e...a475 | 9.2930543319 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.