| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| SWISE / WETH 0.3% | uniswap_v3 | 0x2af4...9afa | 0.005161656458 |
| SWISE / WETH 1% | uniswap_v3 | 0x15d1...78fc | 0.0393816163403169 |
| SWISE / sETH2 0.3% | uniswap_v3 | 0x992f...2160 | 0.004649254379 |
| SWISE / ETH 1% | ekubo-v3-ethereum | 0x0000...0260 | 0.005251322186 |
| ICHI / SWISE 0.3% | uniswap_v3 | 0x57a2...1d49 | 0.005127926592 |
| SWISE / WETH | uniswap_v2 | 0xe74b...403a | 0.004759958491 |
| SWISE / DAI 0.3% | uniswap_v3 | 0xf2af...dbb6 | 0.1359379082295128694577136131458 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.