| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| NVDAon / USDC 1% | uniswap_v3 | 0xf529...bc7a | 185.183536441329 |
| NVDAon / ZIK | uniswap_v2 | 0xea0f...b3d0 | 181.427874555052 |
| NVDAon / ZIK 1% | uniswap-v4-ethereum | 0xeb35...db39 | 180.296405863655 |
| NVDAon / ETH 50% | uniswap-v4-ethereum | 0x0208...9c9d | 158.9178547878 |
| NVDAon / ZIK 1% | uniswap_v3 | 0x758c...dbeb | 188.1270265757 |
| NVDAon / ETH 88% | uniswap-v4-ethereum | 0x1373...fced | 1498.7722824949 |
| NVDAon / ETH 80% | uniswap-v4-ethereum | 0xce0d...6999 | 1175.9771531181 |
| NVDAon / ETH 75% | uniswap-v4-ethereum | 0xa7ac...4aab | 1056.4561072155 |
| NVDAon / USDT 50% | uniswap-v4-ethereum | 0x36b0...a770 | 173.9488427959 |
| NVDAon / USDC 70% | uniswap-v4-ethereum | 0x409e...9469 | 179.5988786077 |
| NVDAon / USDC 29% | uniswap-v4-ethereum | 0xfa6a...af98 | 175.5958188475 |
| NVDAon / USDT 40% | uniswap-v4-ethereum | 0xeeb1...b0c4 | 172.4248838297 |
| NVDAon / USDT 80% | uniswap-v4-ethereum | 0xddc6...d34a | 1331.7126241617 |
| NVDAon / USDC 30% | uniswap-v4-ethereum | 0x656d...b585 | 182.2760702966 |
| 1INCH / NVDAon 1% | uniswap-v4-ethereum | 0x4363...3cf2 | 174.451151926 |
| NVDAon / GOOGLon 1% | uniswap-v4-ethereum | 0x3ea9...6a5c | 191.465141122513 |
| AAPLon / NVDAon / METAon / MSFTon / GOOGLon / AMZNon / waEthUSDC / TSLAon 0.3% | balancer-v3-ethereum | 0xf1da...74cc | 202.429008956268 |
| AAPLon / NVDAon / METAon / MSFTon / GOOGLon / AMZNon / waEthUSDC / TSLAon 0.5% | balancer-v3-ethereum | 0x8b24...fb50 | 208.610812911164 |
| AAPLon / NVDAon / METAon / aEthUSDC / MSFTon / GOOGLon / AMZNon / TSLAon 0.5% | balancer-v3-ethereum | 0x1b52...e23b | 188.434977380319 |
| AAPLon / NVDAon / METAon / USDC / MSFTon / GOOGLon / AMZNon / TSLAon 0.5% | balancer-v3-ethereum | 0x6a56...e617 | 1.0008270858771 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.