| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| 1INCH / LINK 0.3% | uniswap_v3 | 0x2802...e4c2 | 0.174098595430957 |
| 1INCH / WETH 1% | uniswap_v3 | 0xe931...cb97 | 0.173644944090052 |
| 1INCH / AAVE 1% | uniswap_v3 | 0xcb65...2c3a | 0.176801093827097 |
| 1INCH / ETH 1% | uniswap-v4-ethereum | 0xbdaa...d5e9 | 0.176290296941446 |
| 1INCH / UNI 1% | uniswap_v3 | 0x0619...0ac7 | 0.180019301962916 |
| 1INCH / USDC 1% | uniswap-v4-ethereum | 0x1ff1...e81d | 0.174556636425328 |
| 1INCH / WETH | uniswap_v2 | 0x26aa...86f2 | 0.175080195607123 |
| 1INCH / USDC 1% | uniswap_v3 | 0x9feb...82ae | 0.176502193216176 |
| 1INCH / ICHI 0.3% | uniswap_v3 | 0x8c52...9803 | 0.176420487840216 |
| 1INCH / WETH 0.3% | uniswap_v3 | 0xd35e...4b44 | 0.177880612929683 |
| 1INCH / WETH | sushiswap | 0x86f5...b04d | 0.1765170828796 |
| 1INCH / UNI 1% | uniswap-v4-ethereum | 0x339d...d4e9 | 0.182220622497369 |
| 1INCH / ZIK 1% | uniswap_v3 | 0xc95e...7194 | 0.176790641374171 |
| 1INCH / KABOSU | uniswap_v2 | 0xbc13...d5ec | 0.17645936598327 |
| SOTU / 1INCH | uniswap_v2 | 0x7682...675b | 0.177305974696255 |
| 1INCH / ETHMNY 1% | uniswap_v3 | 0xf34e...0608 | 0.17686391199688 |
| 1INCH / VVV | uniswap_v2 | 0x94d6...fd77 | 0.177616129319331 |
| 1INCH / WETH | shibaswap | 0x6ced...4d3a | 0.188745146873449 |
| 1INCH / USDC | sushiswap | 0x8793...698f | 0.180142239290201 |
| 1INCH / UNI | sushiswap | 0xf7df...0b93 | 0.130843482493706 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.