| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| AAPLon / USDC 1% | uniswap_v3 | 0xad82...9921 | 281.783051702147 |
| AAPLon / ETH 48% | uniswap-v4-ethereum | 0x5e8b...1842 | 212.6850755785 |
| AAPLon / USDC 1% | uniswap-v4-ethereum | 0x1d33...d2f8 | 258.9811882475 |
| AAPLon / USDC 29% | uniswap-v4-ethereum | 0xeda7...c242 | 199.6594501845 |
| AAPLon / USDT 40% | uniswap-v4-ethereum | 0x6918...632f | 469.8562154717 |
| AAPLon / USDC 30% | uniswap-v4-ethereum | 0xcb9e...6b81 | 193.4101094866 |
| AAPLon / WBTC 0.25% | uniswap-v4-ethereum | 0xe6e6...c997 | 278.8254779576 |
| AAPLon / WBTC 0.3% | uniswap-v4-ethereum | 0x383f...da98 | 258.6942687569 |
| AAPLon / WBTC 0.5% | uniswap-v4-ethereum | 0xb992...7114 | 275.8836472123 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.