| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| aEthWETH / ETH 58% | uniswap-v4-ethereum | 0x66f4...adbd | 1818.7120901623 |
| aEthWETH / WETH 0.3% | uniswap_v3 | 0xad72...2104 | 2034.7355604355 |
| aEthWETH / CHIMP | uniswap_v2 | 0x4178...9d28 | 2788.5994328804 |
| aEthWETH / ETH 69% | uniswap-v4-ethereum | 0xfa47...d4c3 | 2702.0215516612 |
| aEthWETH / USDT 37.999% | uniswap-v4-ethereum | 0xe346...94bc | 1237.9392932051 |
| aEthWETH / ETH 70% | uniswap-v4-ethereum | 0x9f8f...79f2 | 3009.0761173044 |
| aEthWETH / ETH 39% | uniswap-v4-ethereum | 0xf085...b536 | 2154.6380396399 |
| aEthWETH / ETH 40% | uniswap-v4-ethereum | 0x8ea8...0d75 | 1288.6591177871 |
| aEthWETH / ETH 36% | uniswap-v4-ethereum | 0x0309...8cb0 | 1198.7415567348 |
| aEthWETH / ETH 49% | uniswap-v4-ethereum | 0xe86e...9906 | 2853.4399690956 |
| aEthWETH / ETH 50% | uniswap-v4-ethereum | 0x5ebf...df4b | 4505.3525540268 |
| aEthWETH / ETH 60% | uniswap-v4-ethereum | 0xd7b8...c0fe | 772.6381111443 |
| aEthWETH / USDC 60% | uniswap-v4-ethereum | 0x5476...cefa | 774.7137666669 |
| aEthWETH / USDC 89.9% | uniswap-v4-ethereum | 0x78cd...aeba | 1230.7343830042 |
| aEthWETH / ETH 38% | uniswap-v4-ethereum | 0x183c...a318 | 2270.9608372364 |
| aEthWETH / ETH 42% | uniswap-v4-ethereum | 0x9205...5193 | 2063.7647457564 |
| aEthWETH / ETH 85% | uniswap-v4-ethereum | 0x6894...de50 | 10592.4883543383 |
| aEthWETH / USDC 66% | uniswap-v4-ethereum | 0x949e...f284 | 878.6508760507 |
| aEthWETH / ETH 90% | uniswap-v4-ethereum | 0x5169...3a52 | 14500.5920121036 |
| aEthWETH / ETH 80% | uniswap-v4-ethereum | 0xbcc7...07cc | 741.0939109652 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.