| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| A2Z / USDT 10% | uniswap-v4-ethereum | 0x4448...63d6 | 0.003568608526 |
| A2Z / USDT 60% | uniswap-v4-ethereum | 0xf220...9dad | 0.006818942912 |
| A2Z / USDT 48% | uniswap-v4-ethereum | 0x1a23...ec3b | 0.003964566414 |
| A2Z / USDT 1% | uniswap-v4-ethereum | 0xaff8...90e2 | 0.004928331587 |
| A2Z / USDC 88% | uniswap-v4-ethereum | 0xc447...8fa1 | 0.001146941647 |
| A2Z / USDT 9% | uniswap-v4-ethereum | 0xce6c...de88 | 0.0013777096692383 |
| A2Z / USDC 20% | uniswap-v4-ethereum | 0x3d85...c191 | 0.003531289245 |
| A2Z / USDT 50% | uniswap-v4-ethereum | 0x587a...db25 | 0.003343441525 |
| A2Z / USDT 3% | uniswap-v4-ethereum | 0xc510...db65 | 0.001497709262 |
| A2Z / ETH 60% | uniswap-v4-ethereum | 0x928d...e75d | 0.001145476565 |
| A2Z / USDT 55% | uniswap-v4-ethereum | 0xc44c...91ae | 0.001356751877 |
| A2Z / USDC 15% | uniswap-v4-ethereum | 0x8d43...2710 | 0.002845840191 |
| A2Z / ETH 10% | uniswap-v4-ethereum | 0x02ad...7232 | 0.006634785337 |
| A2Z / ETH 0.95% | uniswap-v4-ethereum | 0x934f...9a7c | 0.006104468794 |
| A2Z / USDT 9.9% | uniswap-v4-ethereum | 0xf94b...a4e4 | 0.008640649068 |
| A2Z / ETH 1% | uniswap-v4-ethereum | 0x24de...4b9c | 0.006335889929 |
| A2Z / ETH 80% | uniswap-v4-ethereum | 0x1e7c...0707 | 0.04493812337 |
| A2Z / DAI 1% | uniswap-v4-ethereum | 0xafea...d9d1 | 0.001875024179 |
| A2Z / LOKA 1% | uniswap-v4-ethereum | 0x88ae...800c | 0.007157816031 |
| A2Z / USDT 1% | pancakeswap-v3-ethereum | 0xfd43...51a6 | 0.004043916858 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.