| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ICP / WETH 0.05% | uniswap_v3 | 0x4068...bd59 | 3.2858682835 |
| ICP / WETH 1% | uniswap_v3 | 0x4845...9ddb | 3.3250586276 |
| ICP / USDT 52% | uniswap-v4-ethereum | 0x467c...01e6 | 1.9252333278 |
| ICP / USDT 55% | uniswap-v4-ethereum | 0x3744...38f5 | 1.924157684 |
| ICP / ETH 68% | uniswap-v4-ethereum | 0x6be9...c2d0 | 1.0071938933 |
| ICP / USDT 40% | uniswap-v4-ethereum | 0x0fc6...736f | 2.4943883738 |
| ICP / USDT 25% | uniswap-v4-ethereum | 0x690b...e714 | 3.255992729 |
| ICP / USDT 54% | uniswap-v4-ethereum | 0x94fe...6ade | 1.9125294848 |
| ICP / ETH 50% | uniswap-v4-ethereum | 0xb9a0...10e7 | 6.0505957531 |
| ICP / USDC 0.05% | uniswap-v4-ethereum | 0x225f...fbb3 | 3.2179130363 |
| ICP / WETH 0.01% | uniswap_v3 | 0xcbc7...41c6 | 5.797761201 |
| ICP / SHIT 36% | uniswap-v4-ethereum | 0x51dd...bb3e | 3.5536778822 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.