| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| EPT / ETH 80% | uniswap-v4-ethereum | 0x3d1a...d0e8 | 0.002461811107 |
| EPT / ETH 75% | uniswap-v4-ethereum | 0xba4d...3f63 | 0.004914979926 |
| EPT / ETH 29% | uniswap-v4-ethereum | 0x7006...3e2b | 0.00174400519870326 |
| EPT / ETH 35% | uniswap-v4-ethereum | 0x3b27...fb5b | 0.004656262765 |
| EPT / ETH 78% | uniswap-v4-ethereum | 0x3836...4afc | 0.0454750031 |
| EPT / ETH 5% | uniswap-v4-ethereum | 0x7e4d...313d | 0.02730849636 |
| EPT / ETH 5% | uniswap-v4-ethereum | 0x4685...0e35 | 0.01365385442 |
| EPT / ETH 1% | uniswap-v4-ethereum | 0x2724...f2b0 | 1670198.39021648 |
| EPT / ETH 30% | uniswap-v4-ethereum | 0xb1a5...28e1 | 0.01659459858 |
| EPT / ETH 90% | uniswap-v4-ethereum | 0x51d9...c3e2 | 2.0999706063 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.