| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| AWF / WETH | uniswap_v2 | 0x0836...d662 | 0.006957822933 |
| AWF / WETH 1% | pancakeswap-v3-ethereum | 0x528c...b88f | 0.007023441466 |
| AWF / ETH 1.01% | uniswap-v4-ethereum | 0x0dee...26db | 0.00695541208 |
| AWF / ETH 2.5% | uniswap-v4-ethereum | 0xdfc7...260a | 0.007715892711 |
| AWF / ETH 2.33% | uniswap-v4-ethereum | 0x2b92...e264 | 0.007905119101 |
| AWF / USDC 1% | pancakeswap-v3-ethereum | 0xe377...0eed | 0.005003935947 |
| AWF / USDC 4.989% | uniswap-v4-ethereum | 0xa874...2426 | 0.008588400689 |
| AWF / USDC 2% | uniswap-v4-ethereum | 0x0d3a...67a5 | 0.007839377822 |
| AWF / ETH 1% | uniswap-v4-ethereum | 0x3b56...3979 | 0.007853081468 |
| AWF / USDC 6.99% | uniswap-v4-ethereum | 0x4aa6...3a79 | 0.005223461656 |
| AWF / USDC 3.6% | uniswap-v4-ethereum | 0x6e5e...9b19 | 0.004484737914 |
| AWF / USDC | uniswap_v2 | 0x3089...61ce | 0.007082856753 |
| AWF / USDC 3.911% | uniswap-v4-ethereum | 0x26ac...3674 | 0.006731576783 |
| AWF / ETH 3% | uniswap-v4-ethereum | 0x5d58...119e | 0.01040929048 |
| AWF / USDC 3% | uniswap-v4-ethereum | 0x69ef...eaab | 0.003856045611 |
| AWF / ETH 3% | uniswap-v4-ethereum | 0xffe5...ef23 | 0.008658866363 |
| AWF / USDC 6.689% | uniswap-v4-ethereum | 0x3dd9...2ca5 | 0.005117635628 |
| AWF / USDT | uniswap_v2 | 0x1b2a...eb12 | 0.07406225845 |
| LO0P / AWF | uniswap_v2 | 0x88da...d993 | 0.00715428385578997 |
| AWF / USDC 3.55% | uniswap-v4-ethereum | 0x786e...bf11 | 0.007629142087 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.