| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ETH / LINK 0.3% | uniswap-v4-ethereum | 0xb2b5...e2e4 | 9.30203481156715 |
| LINK / WETH 0.3% | uniswap_v3 | 0xa6cc...93e8 | 9.28977188042677 |
| stLINK / LINK | curve | 0x7e13...1761 | 9.03868802237897 |
| LINK / WETH 0.05% | uniswap_v3 | 0x5d4f...8c83 | 9.27887756029677 |
| USDC / LINK 0.3% | uniswap-v4-ethereum | 0x50ae...3280 | 9.30265882888937 |
| LINK / USDC 0.3% | uniswap_v3 | 0xfad5...1559 | 9.28153314810341 |
| LINK / WETH 0.3% | supernova-cl | 0x059f...ea4e | 9.29843790451611 |
| LINK / WETH 0.3% | sushiswap-v3-ethereum | 0xa5f4...e9c4 | 9.30209350842523 |
| LINK / WETH | uniswap_v2 | 0xa210...b974 | 9.28435070785068 |
| SDL / LINK 1% | uniswap_v3 | 0x51d1...1fc3 | 9.28104214843317 |
| 1INCH / LINK 0.3% | uniswap_v3 | 0x2802...e4c2 | 9.28894440400259 |
| AAVE / LINK 0.3% | uniswap-v4-ethereum | 0x6bca...529b | 9.28740238019387 |
| AAVE / LINK 0.3% | uniswap_v3 | 0x1424...528a | 9.28104215411075 |
| 1INCH / LINK 1% | uniswap-v4-ethereum | 0x17bc...2958 | 9.4463726268659 |
| LINK / WETH 0.05% | cypher | 0xc0cf...1aae | 9.25640937199443 |
| USDT / LINK 0.01% | uniswap-v4-ethereum | 0xa089...ca2d | 9.2975164907161 |
| ETH / LINK 1% | uniswap-v4-ethereum | 0x4bc5...4355 | 9.4361470099917 |
| stLINK / LINK | curve | 0x1c89...93b0 | 9.22249400222044 |
| LINK / USDT 0.3% | uniswap_v3 | 0xac5a...f0a7 | 9.28104215411075 |
| UNI / LINK 0.3% | uniswap_v3 | 0x9f17...550a | 9.28153314810341 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.