| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| 1INCH / LINK 0.3% | uniswap_v3 | 0x2802...e4c2 | 0.113939469798776 |
| 1INCH / UNI 1% | uniswap_v3 | 0x0619...0ac7 | 0.114857224472954 |
| 1INCH / USDT 0.3% | uniswap-v4-ethereum | 0x1d6b...9ee4 | 0.11267485883707 |
| 1INCH / ETH 1% | uniswap-v4-ethereum | 0xbdaa...d5e9 | 0.113934681035974 |
| 1INCH / WETH 1% | uniswap_v3 | 0xe931...cb97 | 0.113925228929112 |
| 1INCH / WETH | uniswap_v2 | 0x26aa...86f2 | 0.11324096086627 |
| 1INCH / USDC 1% | uniswap-v4-ethereum | 0x1ff1...e81d | 0.11212380370848 |
| 1INCH / ICHI 0.3% | uniswap_v3 | 0x8c52...9803 | 0.113988348961031 |
| 1INCH / USDC 1% | uniswap_v3 | 0x9feb...82ae | 0.112656610502284 |
| 1INCH / WETH 0.3% | uniswap_v3 | 0xd35e...4b44 | 0.113273153615324 |
| 1INCH / WETH | sushiswap | 0x86f5...b04d | 0.11390647090429 |
| 1INCH / ZIK 1% | uniswap_v3 | 0xc95e...7194 | 0.113963260277812 |
| SOTU / 1INCH | uniswap_v2 | 0x7682...675b | 0.11439102816705 |
| 1INCH / USDT 0.3% | uniswap_v3 | 0x1dee...50d1 | 0.112233132814145 |
| 1INCH / WETH | shibaswap | 0x6ced...4d3a | 0.111783651931532 |
| 1INCH / ETHMNY 1% | kyberswap_elastic | 0x7b97...59e6 | 0.581937956364030845881279998432 |
| 1INCH / USDT 1% | uniswap_v3 | 0xa21e...64ff | 0.130481117848974 |
| 1INCH / ETHMNY 1% | uniswap_v3 | 0xf34e...0608 | 0.12112553538911 |
| 1INCH / UNI 1% | uniswap-v4-ethereum | 0x339d...d4e9 | 0.1822206225 |
| 1INCH / VVV | uniswap_v2 | 0x94d6...fd77 | 0.121748101457443 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.