| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| uPEG / ETH 1% | uniswap-v4-ethereum | 0x94af...a000 | 74.431462285 |
| uPEG / ETH 10% | uniswap-v4-ethereum | 0xa28b...373f | 67.3792096893 |
| uPEG / USDT 2.47% | uniswap-v4-ethereum | 0x5f7e...790a | 75.3994131653 |
| uPEG / ETH 50% | uniswap-v4-ethereum | 0x5fe3...a9fb | 135.2774380487 |
| uPEG / ETH 35% | uniswap-v4-ethereum | 0xc5dd...fe12 | 29.6313744999 |
| uPEG / ETH 30% | uniswap-v4-ethereum | 0xee9a...8afc | 155.5868252211 |
| uPEG / ETH 10.1% | uniswap-v4-ethereum | 0x8a9d...dcef | 69.5459715729 |
| uPEG / ETH 20% | uniswap-v4-ethereum | 0x0cff...aa1d | 104.4368698736 |
| uPEG / ETH 5% | uniswap-v4-ethereum | 0x0385...6919 | 97.7226781107 |
| uPEG / USDT 2.5% | uniswap-v4-ethereum | 0x6992...0c2a | 77.9056789816 |
| uPEG / ETH 7% | uniswap-v4-ethereum | 0x98bf...e1da | 88.5389987015 |
| uPEG / ETH 33% | uniswap-v4-ethereum | 0x74ed...a461 | 62.1414405767 |
| uPEG / USDT 45% | uniswap-v4-ethereum | 0xc1d5...95d7 | 166.2784279121 |
| uPEG / USDC 30% | uniswap-v4-ethereum | 0x2b19...3a9e | 62.7772583251 |
| uPEG / USDC 35% | uniswap-v4-ethereum | 0xf45c...e482 | 69.5261199009 |
| uPEG / ETH 9% | uniswap-v4-ethereum | 0x7a4d...435d | 101.7150062918 |
| uPEG / USDC 28% | uniswap-v4-ethereum | 0x1f50...8a77 | 70.0968210961 |
| uPEG / ETH 29% | uniswap-v4-ethereum | 0xcaf6...f39b | 70.1052306879 |
| uPEG / USDC 40% | uniswap-v4-ethereum | 0x3b22...0915 | 42.4592196315 |
| uPEG / ETH 4.9% | uniswap-v4-ethereum | 0xde27...2cde | 133.3323796713 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.