| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| APE / ETH 0.3% | uniswap-v4-ethereum | 0x9ecc...4441 | 0.234323710781486 |
| APE / WETH 0.3% | uniswap_v3 | 0xac4b...7daf | 0.232733421089961 |
| APE / WETH | uniswap_v2 | 0xb011...e67f | 0.233529075508895 |
| APE / USDT | sushiswap | 0xb27c...4b9f | 0.234690109211243 |
| APE / ODIN | uniswap_v2 | 0xfa7e...a18d | 0.238834003661517 |
| APE / DI 1% | uniswap_v3 | 0x468b...e699 | 0.232236591707232 |
| APE / VYBN 1% | uniswap_v3 | 0x12e6...6972 | 0.23719452171995 |
| APE / WETH | sushiswap | 0x130f...f253 | 0.23467807490358 |
| APE / VVV | uniswap_v2 | 0x5022...888e | 0.234224562083053 |
| PRIMATE / APE | sushiswap | 0xdbb6...402e | 0.237018887697407 |
| APE / WETH | verse | 0x9b35...7b38 | 0.237999453647128 |
| APE / KABOSU | uniswap_v2 | 0x2d8e...9e21 | 0.235155639718679 |
| APE / SOTU | uniswap_v2 | 0x1fa3...d6cc | 0.238752062425736 |
| APE / WETH 1% | uniswap_v3 | 0xf79f...5d27 | 0.244092458765212 |
| vAPE / APE | uniswap_v2 | 0xc704...b481 | 0.236600314295881 |
| APE / WETH | solidlydex | 0x6b57...11b8 | 0.246614842523755 |
| APE / USDC 0.3% | uniswap_v3 | 0xb07f...7324 | 0.255340760722924 |
| APE / WETH | smardex-ethereum | 0x97bf...0b09 | 1.09736022802914 |
| MANA / SAND / APE / ENJ 0.5% | balancer_ethereum | 0x0c3a...6b09 | 0.3332974488 |
| APE / USDT 0.3% | uniswap_v3 | 0x3ed9...7dc4 | 7.33981939 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.