| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| PEAS / DAI 1% | uniswap_v3 | 0xae75...9160 | 0.4544093516 |
| PEAS / WETH 1% | uniswap_v3 | 0x44c9...44a3 | 0.4519214194 |
| PEAS / ODIN | uniswap_v2 | 0xbaf9...2f51 | 0.4551238276 |
| pPEAS / PEAS 0.3% | uniswap_v3 | 0x4ef9...7869 | 0.454310105067123 |
| PEAS / ppPP 0.3% | uniswap_v3 | 0xeeb5...cc26 | 0.4551348991 |
| PEAS / hOHM 1% | uniswap_v3 | 0x74b8...e485 | 0.4548913221 |
| PEAS / pOHM 1% | uniswap_v3 | 0x5207...f02e | 0.4534672144 |
| PEAS / USDC 1% | uniswap-v4-ethereum | 0x62ec...d2a8 | 4.9508687725 |
| PEAS / ppPP 1% | uniswap_v3 | 0x89b3...9ad0 | 0.416682959 |
| PEAS / ETH 1.99% | uniswap-v4-ethereum | 0xfe69...e44d | 1.3323989127 |
| PEAS / SBR 1% | uniswap_v3 | 0xe4e3...2f90 | 0.4507457216 |
| pNPC / PEAS | uniswap_v2 | 0xd6d6...4619 | 0.448447465866156 |
| PEAS / DAI 1% | uniswap-v4-ethereum | 0x48f8...e3aa | 1.8777248198 |
| PEAS / USDT 88% | uniswap-v4-ethereum | 0x23fc...d9a6 | 0.4587400013 |
| PEAS / ETH 0.7% | uniswap-v4-ethereum | 0x9de3...a89c | 1.982971604 |
| pPEAS / PEAS 1% | uniswap_v3 | 0xb0e8...1eb0 | 0.4625194861 |
| PEAS / ETH 2% | uniswap-v4-ethereum | 0xb9aa...5df8 | 2.2537532559 |
| pTRSY / PEAS | uniswap_v2 | 0x3396...722e | 0.4485393543 |
| pBRUME / PEAS | uniswap_v2 | 0x0fae...f60f | 0.4873026215 |
| pePepeCoin / PEAS | uniswap_v2 | 0xe30d...21fd | 3.9357834788 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.