| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| POL / WETH 0.3% | uniswap_v3 | 0x88ad...35d1 | 0.120773056082757 |
| POL / MATIC 0.3% | uniswap_v3 | 0x3944...edbb | 0.120480530710984 |
| POL / ETH 1% | uniswap-v4-ethereum | 0x57ac...3202 | 0.121922764832522 |
| POL / ARKM 1% | uniswap_v3 | 0x6d74...c826 | 0.121210525844514 |
| POL / WETH 1% | sushiswap-v3-ethereum | 0xb722...0ef2 | 0.122005359210477 |
| POL / USDC 0.05% | uniswap_v3 | 0x8bc2...7cb4 | 0.122270203074648 |
| POL / USDT 0.3% | uniswap_v3 | 0xb70a...abc7 | 0.2582809534 |
| POL / ARB 0.3% | uniswap-v4-ethereum | 0x22db...a6f5 | 0.2768330766 |
| POL / wstETH 0.3% | uniswap-v4-ethereum | 0x2274...5f43 | 0.2505922317 |
| POL / stMATIC 20% | uniswap-v4-ethereum | 0x45a3...97e5 | 0.2277632167 |
| POL / MATIC 1% | uniswap_v3 | 0x3765...6924 | 0.185734558 |
| POL / ARKM 1% | uniswap-v4-ethereum | 0x8780...a2ff | 0.1840525161 |
| POL / USDC 0.3% | uniswap-v4-ethereum | 0x9041...beeb | 0.179867123854679 |
| POL / ETH2X 1% | uniswap-v4-ethereum | 0xe9e7...8d6d | 0.3001865749 |
| POL / STEM 1% | uniswap-v4-ethereum | 0x9d41...2fa0 | 0.1358083364 |
| POL / KEN 0.01% | uniswap-v4-ethereum | 0x2d95...15c0 | 0.1172791178 |
| POL / DAI 42% | uniswap-v4-ethereum | 0x6aa4...f758 | 0.128754749601612 |
| POL / WETH | uniswap_v2 | 0x23e0...c4f1 | 0.119997926348408 |
| POL / USDC 0.01% | uniswap-v4-ethereum | 0x068d...0c99 | 0.2407502456 |
| zUSD / POL 1% | uniswap-v4-ethereum | 0x17eb...b590 | 0.1275751044 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.