| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| NVDAon / USDC 1% | uniswap_v3 | 0xf529...bc7a | 176.6845121075 |
| NVDAon / USDC 0.3% | uniswap_v3 | 0xc9b4...3a46 | 173.7377150754 |
| NVDAon / ZIK | uniswap_v2 | 0xea0f...b3d0 | 175.6907910662 |
| NVDAon / ZIK 1% | uniswap-v4-ethereum | 0xeb35...db39 | 176.6487262535 |
| NVDAon / ETH 50% | uniswap-v4-ethereum | 0x0208...9c9d | 115.1057451126 |
| NVDAon / ZIK 1% | uniswap_v3 | 0x758c...dbeb | 188.1270265757 |
| NVDAon / ETH 88% | uniswap-v4-ethereum | 0x1373...fced | 1498.7722824949 |
| NVDAon / USDT 50% | uniswap-v4-ethereum | 0x36b0...a770 | 166.1182697981 |
| NVDAon / ETH 80% | uniswap-v4-ethereum | 0xce0d...6999 | 1175.9771531181 |
| NVDAon / ETH 75% | uniswap-v4-ethereum | 0xa7ac...4aab | 1056.4561072155 |
| NVDAon / USDC 70% | uniswap-v4-ethereum | 0x409e...9469 | 166.4897599608 |
| NVDAon / USDC 29% | uniswap-v4-ethereum | 0xfa6a...af98 | 169.0748817157 |
| NVDAon / USDC 30% | uniswap-v4-ethereum | 0x656d...b585 | 168.9977603794 |
| NVDAon / USDT 40% | uniswap-v4-ethereum | 0xeeb1...b0c4 | 172.4248838297 |
| NVDAon / USDT 80% | uniswap-v4-ethereum | 0xddc6...d34a | 1331.7126241617 |
| NVDAon / ETH 97% | uniswap-v4-ethereum | 0xd138...e733 | 194.3280949901 |
| 1INCH / NVDAon 1% | uniswap-v4-ethereum | 0x4363...3cf2 | 174.451151926 |
| NVDAon / GOOGLon 1% | uniswap-v4-ethereum | 0x3ea9...6a5c | 172.8335316438 |
| AAPLon / NVDAon / METAon / MSFTon / GOOGLon / AMZNon / TSLAon 1% | balancer-v3-ethereum | 0x62fb...42f3 | 172.2618312556 |
| AAPLon / NVDAon / METAon / MSFTon / GOOGLon / AMZNon / waEthUSDC / TSLAon 0.3% | balancer-v3-ethereum | 0xf1da...74cc | 181.490615890180422021602142084389072698491352 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.