| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| LEVER / USDT 99.989% | uniswap-v4-ethereum | 0xe07f...6cc6 | 0.00001128259305 |
| LEVER / ETH 70.02% | uniswap-v4-ethereum | 0xca40...3cb3 | 0.00008594314965 |
| LEVER / ETH 80.01% | uniswap-v4-ethereum | 0xb736...8382 | 0.000004786796371 |
| LEVER / ETH 70.03% | uniswap-v4-ethereum | 0x3768...9f59 | 0.00007631680439 |
| LEVER / ETH 80% | uniswap-v4-ethereum | 0x5301...e8d4 | 0.0000186138676 |
| LEVER / USDT 10% | uniswap-v4-ethereum | 0x1874...213f | 0.00003268447547 |
| LEVER / USDT 80% | uniswap-v4-ethereum | 0x19b8...be1f | 0.000004819176141 |
| LEVER / ETH 50% | uniswap-v4-ethereum | 0x76fe...3a93 | 0.0000134452879 |
| LEVER / ETH 99.991% | uniswap-v4-ethereum | 0x79ec...31ab | 0.00001280274483 |
| LEVER / ETH 70.01% | uniswap-v4-ethereum | 0x29e8...ad7a | 0.00006233812419 |
| LEVER / USDT 88% | uniswap-v4-ethereum | 0x6cc5...edce | 0.000005705455083 |
| LEVER / ETH 99.101% | uniswap-v4-ethereum | 0x7918...c8e4 | 0.001109431236 |
| LEVER / USDT 89.995% | uniswap-v4-ethereum | 0x7a0e...991e | 0.00007151279326 |
| LEVER / USDT 89.994% | uniswap-v4-ethereum | 0x8b37...fab3 | 0.00003044822911 |
| LEVER / ETH 70% | uniswap-v4-ethereum | 0x58e4...c7b3 | 0.00008720251036 |
| LEVER / WETH 1% | uniswap_v3 | 0x0d5d...9f00 | 0.008180966114 |
| LEVER / ETH 99.909% | uniswap-v4-ethereum | 0x22ef...d82a | 0.00001130492806 |
| LEVER / USDT 89.996% | uniswap-v4-ethereum | 0xbd5f...2fc4 | 0.00006246654293 |
| LEVER / ETH 99.918% | uniswap-v4-ethereum | 0x96bb...be1f | 0.00001204783494 |
| LEVER / USDT 89.999% | uniswap-v4-ethereum | 0xefb7...289d | 0.0001282757458 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.