| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| USOon / USDC 1% | uniswap_v3 | 0x55a0...d9d0 | 131.0179754845 |
| USOon / USDC 0.3% | uniswap-v4-ethereum | 0x372a...4466 | 130.7257221024 |
| USOon / USDC 82% | uniswap-v4-ethereum | 0x4f92...0061 | 349.9055280631 |
| USOon / USDC 75% | uniswap-v4-ethereum | 0x5642...32f9 | 657.4758362244 |
| USOon / USDC 76% | uniswap-v4-ethereum | 0x03cc...9dbb | 40.9535184102 |
| USOon / USDC 77% | uniswap-v4-ethereum | 0x2908...4f21 | 654.1726112792 |
| USOon / ETH 99% | uniswap-v4-ethereum | 0x8b02...03eb | 441524.123825473 |
| USOon / USDC 74.99% | uniswap-v4-ethereum | 0x1609...a49b | 303.9716888665 |
| USOon / USDC 74% | uniswap-v4-ethereum | 0xfb4a...b67f | 305.0522894707 |
| USOon / GLDon 1% | uniswap_v3 | 0x75f9...cd2f | 116.2520193606 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.