| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ICP / WETH 0.05% | uniswap_v3 | 0x4068...bd59 | 3.09905336089293 |
| ICP / WETH 1% | uniswap_v3 | 0x4845...9ddb | 3.12040589940737 |
| ICP / USDT 52% | uniswap-v4-ethereum | 0x467c...01e6 | 10.4454938833 |
| ICP / USDT 55% | uniswap-v4-ethereum | 0x3744...38f5 | 10.4143030618 |
| ICP / ETH 68% | uniswap-v4-ethereum | 0x6be9...c2d0 | 1.0071938933 |
| ICP / USDT 54% | uniswap-v4-ethereum | 0x94fe...6ade | 10.4333213789 |
| ICP / USDT 40% | uniswap-v4-ethereum | 0x0fc6...736f | 2.7367014565 |
| ICP / USDT 25% | uniswap-v4-ethereum | 0x690b...e714 | 2.7363714412 |
| ICP / ETH 50% | uniswap-v4-ethereum | 0xb9a0...10e7 | 6.0505957531 |
| ICP / USDC 0.05% | uniswap-v4-ethereum | 0x225f...fbb3 | 3.2179130363 |
| ICP / WETH 0.01% | uniswap_v3 | 0xcbc7...41c6 | 5.797761201 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.