| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| PEAS / DAI 1% | uniswap_v3 | 0xae75...9160 | 0.760838469327471 |
| PEAS / WETH 1% | uniswap_v3 | 0x44c9...44a3 | 0.758641976515265 |
| PEAS / ODIN | uniswap_v2 | 0xbaf9...2f51 | 0.755644488766072 |
| pPEAS / PEAS 0.3% | uniswap_v3 | 0x4ef9...7869 | 0.759061865094897 |
| PEAS / SBR 1% | uniswap_v3 | 0xe4e3...2f90 | 0.758900169001111 |
| PEAS / hOHM 1% | uniswap_v3 | 0x74b8...e485 | 0.771331402305596 |
| PEAS / USDC 1% | uniswap-v4-ethereum | 0x62ec...d2a8 | 4.9508687725 |
| PEAS / ppPP 0.3% | uniswap_v3 | 0xeeb5...cc26 | 0.76945658030305 |
| PEAS / pOHM 1% | uniswap_v3 | 0x5207...f02e | 0.7389911999 |
| pNPC / PEAS | uniswap_v2 | 0xd6d6...4619 | 0.7536804468521 |
| PEAS / ppPP 1% | uniswap_v3 | 0x89b3...9ad0 | 1.3887660443 |
| PEAS / ETH 1.99% | uniswap-v4-ethereum | 0xfe69...e44d | 1.3323989127 |
| pJJ / PEAS | uniswap_v2 | 0xdae6...3c17 | 0.7156575793 |
| PEAS / DAI 1% | uniswap-v4-ethereum | 0x48f8...e3aa | 1.8777248198 |
| pPEAS / PEAS 1% | uniswap_v3 | 0xb0e8...1eb0 | 0.7335732296 |
| pTRSY / PEAS | uniswap_v2 | 0x3396...722e | 1.1654522066 |
| PEAS / ETH 0.7% | uniswap-v4-ethereum | 0x9de3...a89c | 1.982971604 |
| PEAS / ETH 2% | uniswap-v4-ethereum | 0xb9aa...5df8 | 2.2537532559 |
| pBRUME / PEAS | uniswap_v2 | 0x0fae...f60f | 1.2300687114 |
| pePepeCoin / PEAS | uniswap_v2 | 0xe30d...21fd | 3.9357834788 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.