| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| LEVER / USDT 50% | uniswap-v4-ethereum | 0xb994...0ba4 | 0.0000005110087217 |
| LEVER / WETH | dodo-pmm-ethereum | 0x184c...ba38 | 0.0000004079205225 |
| LEVER / USDT 99.989% | uniswap-v4-ethereum | 0xe07f...6cc6 | 0.00001128259305 |
| LEVER / ETH 70.02% | uniswap-v4-ethereum | 0xca40...3cb3 | 0.00008594314965 |
| LEVER / ETH 80.01% | uniswap-v4-ethereum | 0xb736...8382 | 0.0000008184620516 |
| LEVER / ETH 70.03% | uniswap-v4-ethereum | 0x3768...9f59 | 0.00007631680439 |
| LEVER / ETH 80% | uniswap-v4-ethereum | 0x5301...e8d4 | 0.0000186138676 |
| LEVER / USDT 10% | uniswap-v4-ethereum | 0x1874...213f | 0.00003268447547 |
| LEVER / USDT 80% | uniswap-v4-ethereum | 0x19b8...be1f | 0.000000997642471 |
| LEVER / ETH 50% | uniswap-v4-ethereum | 0x76fe...3a93 | 0.0000001348020267 |
| LEVER / ETH 99.991% | uniswap-v4-ethereum | 0x79ec...31ab | 0.00001280274483 |
| LEVER / ETH 70.01% | uniswap-v4-ethereum | 0x29e8...ad7a | 0.00006233812419 |
| LEVER / USDT 88% | uniswap-v4-ethereum | 0x6cc5...edce | 0.0000004798350467 |
| LEVER / ETH 99.101% | uniswap-v4-ethereum | 0x7918...c8e4 | 0.001109431236 |
| LEVER / USDT 89.995% | uniswap-v4-ethereum | 0x7a0e...991e | 0.00007151279326 |
| LEVER / ETH 70% | uniswap-v4-ethereum | 0x58e4...c7b3 | 0.00008720251036 |
| LEVER / USDT 89.994% | uniswap-v4-ethereum | 0x8b37...fab3 | 0.00003905995199 |
| LEVER / WETH 1% | uniswap_v3 | 0x0d5d...9f00 | 0.008180966114 |
| LEVER / ETH 99.909% | uniswap-v4-ethereum | 0x22ef...d82a | 0.00001130492806 |
| LEVER / USDT 89.993% | uniswap-v4-ethereum | 0xd914...09fe | 0.00001879591582 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.