| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ML / USDT 6% | uniswap-v4-ethereum | 0xecf5...cc7e | 0.007215433425 |
| ML / ETH 60.01% | uniswap-v4-ethereum | 0x102d...e65d | 0.01706556404 |
| ML / USDT 21% | uniswap-v4-ethereum | 0x1963...288a | 0.00677555514 |
| ML / ETH 97% | uniswap-v4-ethereum | 0x9339...0401 | 0.01396816195 |
| ML / ETH 60% | uniswap-v4-ethereum | 0x7537...89ba | 0.009300645642 |
| ML / ETH 22% | uniswap-v4-ethereum | 0xdef9...e24b | 0.006336226467 |
| ML / USDC 99.511% | uniswap-v4-ethereum | 0xb258...0a29 | 0.007478796419 |
| ML / USDT 25% | uniswap-v4-ethereum | 0x4c01...407a | 0.0142019306 |
| ML / ETH 40% | uniswap-v4-ethereum | 0x474c...e96a | 0.01258798599 |
| ML / USDT 10% | uniswap-v4-ethereum | 0xf96a...f73a | 0.0115076728 |
| ML / USDT 5% | uniswap-v4-ethereum | 0x0856...411b | 0.007640388492 |
| ML / USDC 98% | uniswap-v4-ethereum | 0x0467...4e44 | 0.01381993666 |
| ML / USDC 98% | uniswap-v4-ethereum | 0x4074...b620 | 0.009547157954 |
| ML / ETH 0.999% | uniswap-v4-ethereum | 0xcb51...861b | 0.02986725471 |
| ML / ETH 90.1% | uniswap-v4-ethereum | 0xc1da...3621 | 0.02830138764 |
| ML / USDC 12.5% | uniswap-v4-ethereum | 0x5c49...95b8 | 0.01837406764 |
| ML / ETH 90.2% | uniswap-v4-ethereum | 0x19b5...97f3 | 0.02841054085 |
| ML / USDT 3% | uniswap-v4-ethereum | 0x232a...c47f | 0.01427486765 |
| ML / ETH 90% | uniswap-v4-ethereum | 0xef01...d6eb | 0.02496790713 |
| ML / USDT 1% | uniswap_v3 | 0x546c...8290 | 0.3060217394 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.