| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ESP / USDC 1% | uniswap-v4-ethereum | 0x1d30...a06e | 0.053940596470482 |
| ESP / ETH 3.01% | uniswap-v4-ethereum | 0x0e02...20ee | 0.0553146738858877 |
| ESP / USDC 0.3% | uniswap-v4-ethereum | 0x0664...cdd8 | 0.0610308560588737 |
| ESP / USDC 0.3% | uniswap-v4-ethereum | 0x4835...dda8 | 0.0629335971161961 |
| ESP / ETH 1% | uniswap-v4-ethereum | 0x4182...8684 | 0.0596637052998091 |
| ESP / USDC 0.9% | uniswap-v4-ethereum | 0x4b58...3cfe | 0.0733607103327318 |
| ESP / USDC 1.9% | uniswap-v4-ethereum | 0x0a87...8825 | 0.0714410723998075 |
| ESP / USDT 1.88% | uniswap-v4-ethereum | 0xb399...5fc6 | 0.0681877422160032 |
| ESP / USDC 1.919% | uniswap-v4-ethereum | 0xc175...c02c | 0.0682720745900661 |
| ESP / USDC 2.4% | uniswap-v4-ethereum | 0xe6c8...09f6 | 0.0685358595943994 |
| ESP / USDC 2.556% | uniswap-v4-ethereum | 0x2d70...c4f4 | 0.0623167960229074 |
| ESP / USDC 1.988% | uniswap-v4-ethereum | 0x6064...565f | 0.0714228642262198 |
| ESP / USDC 0.82% | uniswap-v4-ethereum | 0x7f91...ee75 | 0.0741902201553844 |
| ESP / USDC 0.86% | uniswap-v4-ethereum | 0x04d7...77d4 | 0.0732778901133396 |
| ESP / USDC 2.687% | uniswap-v4-ethereum | 0x3520...5d46 | 0.0696353012106702 |
| ESP / USDC 2.33% | uniswap-v4-ethereum | 0xbd73...6619 | 0.0654468719277618 |
| ESP / USDC 2.535% | uniswap-v4-ethereum | 0x433c...297e | 0.0705979972101213 |
| ESP / USDC 1.688% | uniswap-v4-ethereum | 0xe17f...2923 | 0.0678869910235645 |
| ESP / USDC 1.8% | uniswap-v4-ethereum | 0xb4fe...7d3e | 0.0694564472420537 |
| ESP / USDC 1.44% | uniswap-v4-ethereum | 0x03f7...bb5c | 0.0697542791753965 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.