| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| Archangel / WETH | uniswap_v2 | 0xad22...cb08 | 0.0002587138473 |
| Archangel / USDC 2.234% | uniswap-v4-ethereum | 0x2d6b...f410 | 0.0004236408985 |
| Archangel / ETH 4% | uniswap-v4-ethereum | 0xc081...b423 | 0.0007878646995 |
| Archangel / USDC 1.99% | uniswap-v4-ethereum | 0xe581...3f1e | 0.000813549622 |
| Archangel / USDC 1.8% | uniswap-v4-ethereum | 0x3aaa...ff1a | 0.0005374620574 |
| Archangel / WETH 1% | uniswap_v3 | 0xa772...c17c | 0.0002907713824 |
| Archangel / ETH 4% | uniswap-v4-ethereum | 0x3f0d...4878 | 0.0007533560143 |
| Archangel / USDC 12.77% | uniswap-v4-ethereum | 0xe1d4...9500 | 0.0004679202392 |
| Archangel / USDT 4.558% | uniswap-v4-ethereum | 0xde70...e9d8 | 0.0005222402827 |
| Archangel / ETH 7% | uniswap-v4-ethereum | 0x7d45...b34c | 0.0006704876597 |
| Archangel / USDC 3.986% | uniswap-v4-ethereum | 0xd48b...5807 | 0.0006230981214 |
| Archangel / USDC 2.988% | uniswap-v4-ethereum | 0xd7d2...7237 | 0.0005886587293 |
| Archangel / USDC 4.882% | uniswap-v4-ethereum | 0xc1ba...99e0 | 0.0005643265606 |
| Archangel / USDC 1.889% | uniswap-v4-ethereum | 0xed3c...b0e6 | 0.0007509876767 |
| Archangel / USDC 4.776% | uniswap-v4-ethereum | 0xe100...7530 | 0.0006930661186 |
| Archangel / USDC 2% | uniswap-v4-ethereum | 0xf5e6...3cd5 | 0.0009191111212 |
| Archangel / USDC 8.998% | uniswap-v4-ethereum | 0xeca3...e16b | 0.00118206889 |
| Archangel / USDC 2.189% | uniswap-v4-ethereum | 0x1709...2655 | 0.0007334811183 |
| Archangel / USDC 13.5% | uniswap-v4-ethereum | 0x5103...1786 | 0.001552387415 |
| Archangel / USDC 1.7% | uniswap-v4-ethereum | 0x6ad2...21e3 | 0.0006803149428 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.