| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| EUROC / EURe 0.01% | uniswap-v4-ethereum | 0x0af7...1ab5 | 1.14932596871004 |
| EURe / EUROC 0.05% | uniswap_v3 | 0x2a81...7d4c | 1.1511862417 |
| EUROC / EURe 0.01% | uniswap_v3 | 0x74a3...2d88 | 1.15138928128088 |
| EUROC / EURe 0.08% | uniswap-v4-ethereum | 0xabd9...c823 | 1.06374424857553 |
| EURe / USDT 80% | uniswap-v4-ethereum | 0xe78f...14a0 | 0.2001674685 |
| EURe / USDC 90% | uniswap-v4-ethereum | 0x2efc...e444 | 0.1565839124 |
| EUROC / EURe 0.06% | uniswap-v4-ethereum | 0xfee1...6e1a | 1.1783562008 |
| EUROC / EURe 0.05% | uniswap-v4-ethereum | 0x7776...66b8 | 0.1576738364 |
| EURe / PAXG 0.05% | uniswap-v4-ethereum | 0x3824...a8ed | 0.2142311461 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.