| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| NODE / ETH 80% | uniswap-v4-ethereum | 0xcf3a...ffad | 1.5488031149 |
| NODE / USDT 70.01% | uniswap-v4-ethereum | 0x5b0c...de2f | 0.005035081824 |
| NODE / ETH 50% | uniswap-v4-ethereum | 0xaec7...f353 | 0.1209846765 |
| NODE / ETH 80% | uniswap-v4-ethereum | 0x49b9...ce7c | 0.07773179176 |
| NODE / ETH 44% | uniswap-v4-ethereum | 0x2cf0...f91a | 0.01693619173 |
| NODE / USDT 19% | uniswap-v4-ethereum | 0x2789...1345 | 0.07450706677 |
| NODE / USDT 70% | uniswap-v4-ethereum | 0xe9e7...e1b9 | 0.01644742532 |
| NODE / USDC 5% | uniswap-v4-ethereum | 0x9eaf...52b8 | 0.06027409204 |
| NODE / ETH 90% | uniswap-v4-ethereum | 0xa4f6...6371 | 3.9066047012 |
| NODE / USDT 99.86% | uniswap-v4-ethereum | 0xce4a...b5c5 | 0.007234958591 |
| NODE / USDC 88% | uniswap-v4-ethereum | 0xfff3...9ae3 | 0.00820801014 |
| NODE / ETH 9.9% | uniswap-v4-ethereum | 0xdf6e...d8f4 | 0.05415022206 |
| NODE / ETH 76% | uniswap-v4-ethereum | 0x632a...d302 | 0.6243240952 |
| NODE / ETH 19% | uniswap-v4-ethereum | 0xd299...eaa2 | 0.01946049695 |
| NODE / DAI 91% | uniswap-v4-ethereum | 0x6fad...f7e8 | 0.0348348761 |
| NODE / ETH 35% | uniswap-v4-ethereum | 0x11f2...876d | 0.220798158 |
| NODE / ETH 88% | uniswap-v4-ethereum | 0xcabe...498f | 0.004248305916 |
| NODE / ETH 20% | uniswap-v4-ethereum | 0xc3e2...aa06 | 0.1153217988 |
| NODE / ETH 60% | uniswap-v4-ethereum | 0x70fc...a138 | 0.3488611403 |
| NODE / ETH 10% | uniswap-v4-ethereum | 0xe009...6996 | 0.1021004051 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.