| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| REPv2 / WETH 1% | uniswap_v3 | 0xb055...17e7 | 1.08287593954903 |
| REPv2 / WETH | uniswap_v2 | 0x8979...1cba | 1.07083479373805 |
| REPv2 / DAI | uniswap_v2 | 0xada6...0703 | 1.10371698650443 |
| GFM / REPv2 0.3% | uniswap-v4-ethereum | 0xee58...d416 | 1.0055010233 |
| REPv2 / USDC 0.3% | uniswap-v4-ethereum | 0xe317...06ca | 0.7349392187 |
| REPv2 / USDC 1% | uniswap-v4-ethereum | 0x7a3c...c523 | 1.0514419682 |
| REPv2 / PYRENEES | uniswap_v2 | 0x4f14...f405 | 1.167966966 |
| REPv2 / USDC 1% | uniswap_v3 | 0xe53f...e34a | 1.6882807477 |
| REPv2 / UPP | uniswap_v2 | 0x4476...051b | 1.8799426306 |
| REPv2 / HOT | uniswap_v2 | 0x4e89...d328 | 1.5091147746 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.