| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| APE / ETH 0.3% | uniswap-v4-ethereum | 0x9ecc...4441 | 0.09817169592 |
| APE / WETH 0.3% | uniswap_v3 | 0xac4b...7daf | 0.09731632577 |
| APE / WETH 0.05% | cypher | 0x6593...dbc4 | 0.09816932985 |
| APE / WETH | uniswap_v2 | 0xb011...e67f | 0.09863825975 |
| APE / USDT | sushiswap | 0xb27c...4b9f | 0.09758149491 |
| APE / ODIN | uniswap_v2 | 0xfa7e...a18d | 0.09809654929 |
| APE / DI 1% | uniswap_v3 | 0x468b...e699 | 0.1015688295 |
| APE / WETH | sushiswap | 0x130f...f253 | 0.09827042785 |
| APE / VVV | uniswap_v2 | 0x5022...888e | 0.1005790699 |
| APE / WETH | verse | 0x9b35...7b38 | 0.09644773544 |
| APE / WETH 1% | uniswap_v3 | 0xf79f...5d27 | 0.1018842661 |
| APE / DAI | verse | 0x690c...d93b | 0.1044103941 |
| $BAPE / APE | uniswap_v2 | 0xd7b8...aa7a | 5.80715323709978731123058947742607324866226531222097131357429434014158643506547860982418952 |
| APE0.5 / APE | uniswap_v2 | 0x2852...a4e0 | 5.17958735656708209922380900305380140845262422385039732439009719143085635197996161845060392 |
| HAPE / APE | uniswap_v2 | 0x56f4...25b5 | 4.18896610933997595281009791358876077244844394291504265387211304915675379457273863181334412 |
| APE / USDC 0.3% | uniswap_v3 | 0xb07f...7324 | 0.2517146414 |
| APE / VYBN 1% | uniswap_v3 | 0x12e6...6972 | 0.1021978057 |
| APE / WETH | smardex-ethereum | 0x97bf...0b09 | 1.09736022802914 |
| PRIMATE / APE | sushiswap | 0xdbb6...402e | 0.101122837014269 |
| APE / SOTU | uniswap_v2 | 0x1fa3...d6cc | 0.1023090305 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.