| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| UNI / WETH 0.3% | uniswap_v3 | 0x1d42...d801 | 4.82156477121894 |
| UNI / WBTC 0.3% | uniswap_v3 | 0x8f0c...cc5b | 4.82158930117602 |
| USDC / UNI 0.3% | uniswap-v4-ethereum | 0x9a5c...5167 | 4.8259625513718 |
| UNI / WETH | uniswap_v2 | 0xd3d2...3a17 | 4.85106678771665 |
| UNI / ETH 0.3% | uniswap-v4-ethereum | 0x053f...90da | 4.82538765730007 |
| UNI / PENDLE 0.3% | uniswap-v4-ethereum | 0x5426...c665 | 4.82682837121565 |
| AAVE / UNI 0.3% | uniswap_v3 | 0x59c3...4756 | 4.82157771163886 |
| USDT / UNI 0.3% | uniswap-v4-ethereum | 0xa20d...175a | 4.8279781773885 |
| UNI / USDC 0.3% | uniswap_v3 | 0xd0fc...6d78 | 4.82286117862115 |
| AAVE / UNI 0.3% | uniswap-v4-ethereum | 0xcd01...8e6f | 4.84450330511446 |
| UNI / USDT 0.3% | uniswap_v3 | 0x3470...8d60 | 4.82449199626383 |
| 1INCH / UNI 1% | uniswap_v3 | 0x0619...0ac7 | 4.91123931331313 |
| UNI / WETH | sushiswap | 0xdafd...4d40 | 4.82474832331208 |
| CRV / UNI 1% | uniswap-v4-ethereum | 0xf00d...9d9d | 4.82947857902413 |
| AAVE / UNI 1% | uniswap_v3 | 0x82bb...6596 | 4.84168671830097 |
| PEPE / UNI / WBTC / PANDORA / PROS / waEthUSDC / WLFI 0.3% | balancer-v3-ethereum | 0xb1f6...27c6 | 4.92730751861611 |
| UNI / DAI 1% | uniswap_v3 | 0xd699...076f | 4.81060585288734 |
| UNI / WETH | shibaswap | 0x9d40...0a75 | 4.85668019814488 |
| CRV / UNI | uniswap_v2 | 0x71aa...1f6e | 4.82047975544595 |
| UNI / LINK 0.3% | uniswap_v3 | 0x9f17...550a | 4.87785593866985 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.