| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| pPEG / ETH 1% | uniswap-v4-ethereum | 0x0290...1609 | 0.2584391031 |
| pPEG / USDC 18% | uniswap-v4-ethereum | 0x7277...3328 | 3.2822995622 |
| pPEG / ETH 25% | uniswap-v4-ethereum | 0xcddd...9b4b | 0.8460544094 |
| pPEG / ETH 35% | uniswap-v4-ethereum | 0x0312...b25d | 1.5853121414 |
| pPEG / USDC 5% | uniswap-v4-ethereum | 0xf6d4...3f86 | 2.8094026298 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.