| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| SPELL / WETH | sushiswap | 0xb5de...6d4e | 0.0001611999245 |
| SPELL / WETH 1% | uniswap_v3 | 0x2138...2fec | 0.0001614657641 |
| MIM / SPELL | sushiswap | 0xc9e8...704f | 0.00016289985231239 |
| SPELL / WETH | curve | 0x9863...6122 | 0.000162161246 |
| SPELL / ETH 1% | uniswap-v4-ethereum | 0x4076...1729 | 0.0002042149564 |
| SPELL / WETH 0.3% | uniswap_v3 | 0xfebf...4997 | 0.0003582697225 |
| SPELL / WETH 0.3% | sushiswap-v3-ethereum | 0x400d...4bab | 0.0001680615321 |
| SPELL / USDT 88% | uniswap-v4-ethereum | 0xcc5a...f96b | 0.0003985902556 |
| SPELL / WETH | uniswap_v2 | 0x74fe...df39 | 0.0001650913648 |
| SPELL / WETH 0.01% | sushiswap-v3-ethereum | 0x949b...838a | 0.0001668794891 |
| SPELL / USDC 0.3% | uniswap_v3 | 0x842d...3d66 | 0.000883011296680177253430898909865 |
| SPELL / USDT | sushiswap | 0x52d3...8ca8 | 0.0001793694098 |
| SPELL / USDC 66% | uniswap-v4-ethereum | 0x32c3...4993 | 0.00007867141497 |
| SPELL / WLFI 1% | uniswap-v4-ethereum | 0x38ae...6549 | 0.0001601999191 |
| SPELL / USDC | sushiswap | 0xf037...43a8 | 0.0002149845874 |
| SPELL / USDC 1% | uniswap_v3 | 0x841e...424c | 0.000883011296680177253430898909865 |
| SPELL / DMusd 0.01% | sushiswap-v3-ethereum | 0xfbf9...bebf | 0.000764538403 |
| SPELL / USDC 0.05% | uniswap_v3 | 0x27e6...0f58 | 0.000876859540631375968788400925073 |
| SPELL / KABOSU | uniswap_v2 | 0xf234...4975 | 0.0002436095658 |
| SPELL / MIM 0.05% | uniswap_v3 | 0x5dcb...a52b | 0.000893452716103237211122026143406 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.