| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| aEthWETH / WETH 0.3% | uniswap_v3 | 0xad72...2104 | 2270.54455641119 |
| aEthWETH / CHIMP | uniswap_v2 | 0x4178...9d28 | 3114.04688408478 |
| aEthWETH / USDT | pancakeswap_ethereum | 0x4800...fbae | 2078.89646121712 |
| aEthWETH / USDC 0.3% | uniswap-v4-ethereum | 0x6d74...3486 | 2040.46959710395 |
| aEthWETH / ETH 40% | uniswap-v4-ethereum | 0x8ea8...0d75 | 1288.65911778711 |
| aEthWETH / NPXS 0.3% | uniswap-v4-ethereum | 0xb5e4...415c | 3055.86860848226 |
| aEthWETH / ETH 69% | uniswap-v4-ethereum | 0xfa47...d4c3 | 3204.39961639448 |
| aEthWETH / ETH 70% | uniswap-v4-ethereum | 0x9f8f...79f2 | 3009.07611730437 |
| aEthWETH / ETH 38% | uniswap-v4-ethereum | 0x183c...a318 | 3206.78350333993 |
| aEthWETH / ETH 49% | uniswap-v4-ethereum | 0xe86e...9906 | 1201.1142332358 |
| aEthWETH / ETH 39% | uniswap-v4-ethereum | 0xf085...b536 | 2154.6380396399 |
| aEthWETH / ETH 50% | uniswap-v4-ethereum | 0x5ebf...df4b | 4505.3525540268 |
| aEthWETH / ETH 42% | uniswap-v4-ethereum | 0x9205...5193 | 2063.7647457564 |
| aEthWETH / ETH 85% | uniswap-v4-ethereum | 0x6894...de50 | 10592.4883543383 |
| aEthWETH / ETH 90% | uniswap-v4-ethereum | 0x5169...3a52 | 14500.5920121036 |
| aEthWETH / ETH 80% | uniswap-v4-ethereum | 0xbcc7...07cc | 741.0939109652 |
| aEthWETH / ETH 1% | uniswap-v4-ethereum | 0x5464...6778 | 2594.3857294966 |
| aEthWETH / ETH 89% | uniswap-v4-ethereum | 0x8387...f92e | 135.1008673659 |
| aEthWETH / USDT 55.338% | uniswap-v4-ethereum | 0x089c...e24f | 2658.1917250545 |
| aEthWETH / USDT 55.339% | uniswap-v4-ethereum | 0x56da...e02b | 2752.2844463778 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.