| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| LA / WETH 0.3% | uniswap_v3 | 0x8cdb...3a71 | 13182531.0352626 |
| LA / USDT 7% | uniswap-v4-ethereum | 0x1b92...f10a | 0.1325363927 |
| LA / USDT 6% | uniswap-v4-ethereum | 0x0f43...d8d4 | 0.132168226 |
| LA / ETH 6% | uniswap-v4-ethereum | 0xa44f...8dba | 0.1422871307 |
| LA / USDT 3% | uniswap-v4-ethereum | 0x3ae8...80e5 | 0.1324154884 |
| LA / USDT 10% | uniswap-v4-ethereum | 0x2ec1...f8b3 | 0.1317881719 |
| LA / ETH 10.2% | uniswap-v4-ethereum | 0x4b36...6d6f | 0.1204612954 |
| LA / USDC 5.93% | uniswap-v4-ethereum | 0xec05...fbd7 | 0.1247604475 |
| LA / USDC 5.926% | uniswap-v4-ethereum | 0x179b...a94c | 0.1315682713 |
| LA / ETH 46% | uniswap-v4-ethereum | 0xf2e5...125d | 0.1083317125 |
| LA / ETH 10.1% | uniswap-v4-ethereum | 0xcf42...e6ac | 0.1332679873 |
| LA / ETH 7.7% | uniswap-v4-ethereum | 0x0cf8...4191 | 0.4072273101 |
| LA / ETH 60% | uniswap-v4-ethereum | 0x03f1...cb5b | 0.3109271317 |
| LA / USDT 88% | uniswap-v4-ethereum | 0x12bb...9f63 | 0.02465598188 |
| LA / ETH 88% | uniswap-v4-ethereum | 0x8c4f...f4f7 | 0.3139794208 |
| LA / USDT 5.02% | uniswap-v4-ethereum | 0x70e8...9a16 | 0.1310454958 |
| LA / USDT 3% | uniswap-v4-ethereum | 0x3780...b1d0 | 0.3618915824 |
| LA / ETH 50% | uniswap-v4-ethereum | 0xf110...2b2a | 0.2442344396 |
| LA / USDC 98.03% | uniswap-v4-ethereum | 0x24cf...f1f7 | 0.1541626732 |
| LA / USDC 5.947% | uniswap-v4-ethereum | 0xe4eb...34c6 | 0.1298233864 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.