| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| EKUBO / USDC 0.3% | ekubo-v3-ethereum | 0x0000...21c9 | 1.0333189841 |
| EKUBO / ETH 0.3% | ekubo-v3-ethereum | 0x0000...5fd0 | 1.0301682148 |
| EKUBO / ETH | ekubo-v3-ethereum | 0x0000...1372 | 1.037622348 |
| EKUBO / USDC 1% | ekubo-v3-ethereum | 0x0000...8b36 | 1.0343990085 |
| EKUBO / ETH 0.3% | ekubo-v3-ethereum | 0x0000...b357 | 1.0242904602 |
| EKUBO / BOLD 1% | ekubo-v3-ethereum | 0x0000...5cee | 1.592370034 |
| EKUBO / USDC 0.3% | uniswap-v4-ethereum | 0x0333...68cd | 6.4976665578 |
| EKUBO / USDC 1% | uniswap-v4-ethereum | 0x5b9a...4dd8 | 3.4867660031 |
| EKUBO / USDC 1% | ekubo-v3-ethereum | 0x0000...6bb6 | 1.5550780105 |
| EKUBO / USDT 0.01% | uniswap-v4-ethereum | 0x9940...f954 | 6.5314042117 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.