| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| aEthWETH / WETH 0.3% | uniswap_v3 | 0xad72...2104 | 3114.52898027625 |
| aEthWETH / ETH 69% | uniswap-v4-ethereum | 0xfa47...d4c3 | 4194.1555166061 |
| aEthWETH / ETH 70% | uniswap-v4-ethereum | 0x9f8f...79f2 | 3908.6091904688 |
| aEthWETH / CHIMP | uniswap_v2 | 0x4178...9d28 | 3128.04036149225 |
| aEthWETH / ETH 49% | uniswap-v4-ethereum | 0xe86e...9906 | 1201.1142332358 |
| aEthWETH / ETH 39% | uniswap-v4-ethereum | 0xf085...b536 | 2154.6380396399 |
| aEthWETH / ETH 40% | uniswap-v4-ethereum | 0x8ea8...0d75 | 1856.9073646717 |
| aEthWETH / ETH 38% | uniswap-v4-ethereum | 0x183c...a318 | 4679.6372447765 |
| aEthWETH / ETH 50% | uniswap-v4-ethereum | 0x5ebf...df4b | 4505.3525540268 |
| aEthWETH / ETH 42% | uniswap-v4-ethereum | 0x9205...5193 | 2063.7647457564 |
| aEthWETH / USDT 55.339% | uniswap-v4-ethereum | 0x56da...e02b | 2752.2844463778 |
| aEthWETH / ETH 85% | uniswap-v4-ethereum | 0x6894...de50 | 10592.4883543383 |
| aEthWETH / ETH 80% | uniswap-v4-ethereum | 0xbcc7...07cc | 741.0939109652 |
| aEthWETH / ETH 89% | uniswap-v4-ethereum | 0x8387...f92e | 135.1008673659 |
| aEthWETH / USDT 55.338% | uniswap-v4-ethereum | 0x089c...e24f | 2658.1917250545 |
| aEthUSDT / aEthWETH 0.3% | uniswap-v4-ethereum | 0xe74d...4cd1 | 661.4238880701 |
| aEthWETH / USDT 55.62% | uniswap-v4-ethereum | 0x84dc...766c | 2508.0617401452 |
| aEthWETH / USDT 55.35% | uniswap-v4-ethereum | 0x8051...9849 | 2581.9794455244 |
| aEthWETH / USDT 55.34% | uniswap-v4-ethereum | 0x65ea...8ebe | 2705.8771006996 |
| aEthWETH / USDT | pancakeswap_ethereum | 0x4800...fbae | 3020.4670635149 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.