| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ESP / USDC 1% | uniswap-v4-ethereum | 0x1d30...a06e | 0.07453663314 |
| ESP / USDC 0.3% | uniswap-v4-ethereum | 0x0664...cdd8 | 0.06103085606 |
| ESP / USDC 0.3% | uniswap-v4-ethereum | 0x4835...dda8 | 0.06293359712 |
| ESP / ETH 1% | uniswap-v4-ethereum | 0x4182...8684 | 0.2025627355 |
| ESP / USDC 0.9% | uniswap-v4-ethereum | 0x4b58...3cfe | 0.07336071033 |
| ESP / USDC 1.9% | uniswap-v4-ethereum | 0x0a87...8825 | 0.0714410724 |
| ESP / USDT 1.88% | uniswap-v4-ethereum | 0xb399...5fc6 | 0.06821662805 |
| ESP / USDC 1.919% | uniswap-v4-ethereum | 0xc175...c02c | 0.06827207459 |
| ESP / USDC 2.4% | uniswap-v4-ethereum | 0xe6c8...09f6 | 0.06853585959 |
| ESP / USDC 2.556% | uniswap-v4-ethereum | 0x2d70...c4f4 | 0.06231679602 |
| ESP / USDC 1.988% | uniswap-v4-ethereum | 0x6064...565f | 0.07142286423 |
| ESP / USDC 0.82% | uniswap-v4-ethereum | 0x7f91...ee75 | 0.07419022016 |
| ESP / ETH 3.01% | uniswap-v4-ethereum | 0x0e02...20ee | 0.074456429 |
| ESP / USDC 0.86% | uniswap-v4-ethereum | 0x04d7...77d4 | 0.07363949223 |
| ESP / USDC 2.687% | uniswap-v4-ethereum | 0x3520...5d46 | 0.07168206673 |
| ESP / USDC 2.33% | uniswap-v4-ethereum | 0xbd73...6619 | 0.06544687193 |
| ESP / USDC 2.535% | uniswap-v4-ethereum | 0x433c...297e | 0.07059799721 |
| ESP / USDC 1.688% | uniswap-v4-ethereum | 0xe17f...2923 | 0.06789458909 |
| ESP / USDC 1.8% | uniswap-v4-ethereum | 0xb4fe...7d3e | 0.06945644724 |
| ESP / USDC 1.44% | uniswap-v4-ethereum | 0x03f7...bb5c | 0.06975427918 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.