| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| APE / ETH 0.3% | uniswap-v4-ethereum | 0x9ecc...4441 | 0.1704716189 |
| APE / WETH 0.05% | cypher | 0x6593...dbc4 | 0.1706731918 |
| APE / WETH 0.3% | uniswap_v3 | 0xac4b...7daf | 0.1663823273 |
| APE / WETH | uniswap_v2 | 0xb011...e67f | 0.1694906634 |
| APE / USDT | sushiswap | 0xb27c...4b9f | 0.1731519658 |
| APE / K9 1% | uniswap_v3 | 0x110e...07a0 | 0.1698173604 |
| APE / WETH | sushiswap | 0x130f...f253 | 0.1724383627 |
| APE / DI 1% | uniswap_v3 | 0x468b...e699 | 0.1718961026 |
| APE / WETH | verse | 0x9b35...7b38 | 0.4766299817 |
| APE / ODIN | uniswap_v2 | 0xfa7e...a18d | 0.1695336923 |
| APE / VYBN 1% | uniswap_v3 | 0x12e6...6972 | 0.1718961026 |
| APE / VVV | uniswap_v2 | 0x5022...888e | 0.1719438482 |
| PRIMATE / APE | sushiswap | 0xdbb6...402e | 0.177179578500877 |
| APE / SOTU | uniswap_v2 | 0x1fa3...d6cc | 0.1690799837 |
| APE / WETH | dodo-pmm-ethereum | 0x5713...fecc | 0.1651808627 |
| APE / WETH 1% | uniswap_v3 | 0xf79f...5d27 | 0.1583697027 |
| vAPE / APE | uniswap_v2 | 0xc704...b481 | 0.166254242326759 |
| APE / WETH | solidlydex | 0x6b57...11b8 | 0.1314513696 |
| $BAPE / APE | uniswap_v2 | 0xd7b8...aa7a | 5.80715323709978731123058947742607324866226531222097131357429434014158643506547860982418952 |
| APE0.5 / APE | uniswap_v2 | 0x2852...a4e0 | 5.17958735656708209922380900305380140845262422385039732439009719143085635197996161845060392 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.