| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ASIC / USDC 1% | uniswap_v3 | 0x25c0...3878 | 0.0382941354777976 |
| ASIC / PLSB 1% | uniswap_v3 | 0xa699...c588 | 0.0381411564785826 |
| ASIC / VVV | uniswap_v2 | 0xbfe8...2b04 | 0.0383265172334235 |
| ASIC / CARN 0.3% | uniswap_v3 | 0xe815...a9e8 | 0.0380754150922558 |
| ASIC / pLTC 1% | uniswap_v3 | 0x8588...db03 | 0.0386193403164588 |
| ASIC / ACR 1% | uniswap-v4-ethereum | 0x1610...86b9 | 0.03721668298 |
| ASIC / ACR | uniswap_v2 | 0x20c3...b664 | 0.03858777352 |
| ASIC / PLSB 0.3% | uniswap-v4-ethereum | 0x64a9...f674 | 0.04070748319 |
| ASIC / USDC 0.3% | uniswap_v3 | 0x4fd8...dff5 | 0.06333608023 |
| ASIC / PLSB 1% | uniswap-v4-ethereum | 0xe316...4af9 | 0.1099822947 |
| ASIC / PLSD 1% | uniswap_v3 | 0xf02d...66ef | 0.05105513123 |
| HEX / ASIC 1% | uniswap-v4-ethereum | 0x8e4c...8499 | 0.07242864876 |
| ASIC / XBTC 1% | uniswap_v3 | 0x5f37...6dd0 | 0.0497961381595001 |
| ASIC / ETH 1% | uniswap-v4-ethereum | 0x922b...850f | 0.07180861184 |
| ASIC / USDC 1% | uniswap-v4-ethereum | 0xfe3e...662d | 0.0198762696 |
| ASIC / PLSD 0.3% | uniswap_v3 | 0x04d9...9ee7 | 2.9091649873805083944346432792445240052 |
| ASIC / WETH 1% | uniswap_v3 | 0x1872...17fa | 0.2025961528 |
| ASIC / ACR 0.3% | uniswap_v3 | 0x97b0...c1dd | 0.0377114967 |
| ASIC / WETH 0.3% | uniswap_v3 | 0x8fe4...b45a | 0.635704198204553 |
| ASIC / PLSB | uniswap_v2 | 0x638b...76b2 | 0.00631724205611258 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.