| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| LMUPEG / WETH 1% | uniswap-v4-ethereum | 0xe6f2...e6ab | 0.5716374706 |
| LMUPEG / ETH 5% | uniswap-v4-ethereum | 0x9c16...0362 | 6.1512622785 |
| LMUPEG / ETH 35% | uniswap-v4-ethereum | 0xb994...cd28 | 8.5921266523 |
| LMUPEG / ETH 4% | uniswap-v4-ethereum | 0xcba2...d4ec | 53.6611762472 |
| LMUPEG / ETH 3% | uniswap-v4-ethereum | 0x3d44...c834 | 51.0691022009 |
| LMUPEG / ETH 0.95% | uniswap-v4-ethereum | 0x9a15...af2f | 62.9889162984 |
| LMUPEG / USDC 35% | uniswap-v4-ethereum | 0x0a5e...b9fa | 64.5583597365 |
| LMUPEG / ETH 10% | uniswap-v4-ethereum | 0xee0c...be0b | 46.4564591453 |
| LMUPEG / USDT 88% | uniswap-v4-ethereum | 0x38be...b636 | 5.6186391602 |
| LMUPEG / WETH 1% | uniswap_v3 | 0x642e...9dc5 | 40.8001487528 |
| LMUPEG / USDC 88% | uniswap-v4-ethereum | 0x032c...8961 | 24.6267169974 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.