| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| LINK / WETH 0.3% | uniswap_v3 | 0xa6cc...93e8 | 9.1140658266 |
| stLINK / LINK | curve | 0x7e13...1761 | 9.14709853465734 |
| LINK / USDT 0.3% | uniswap_v3 | 0xac5a...f0a7 | 9.1210388337 |
| ETH / LINK 0.3% | uniswap-v4-ethereum | 0xb2b5...e2e4 | 9.13278611876339 |
| USDC / LINK 0.3% | uniswap-v4-ethereum | 0x50ae...3280 | 9.14127788664489 |
| LINK / WETH 0.05% | uniswap_v3 | 0x5d4f...8c83 | 9.1104610968 |
| LINK / USDC 0.3% | uniswap_v3 | 0xfad5...1559 | 9.1196087873 |
| 1INCH / LINK 1% | uniswap-v4-ethereum | 0x17bc...2958 | 9.17026888622634 |
| LINK / WETH | uniswap_v2 | 0xa210...b974 | 9.1077700254 |
| LINK / PENDLE 1% | uniswap-v4-ethereum | 0x0e83...1171 | 9.0454062959 |
| LINK / WETH 0.3% | sushiswap-v3-ethereum | 0xa5f4...e9c4 | 9.0660665563 |
| AAVE / LINK 0.3% | uniswap_v3 | 0x1424...528a | 9.11258481545103 |
| 1INCH / LINK 0.3% | uniswap_v3 | 0x2802...e4c2 | 9.10693560918835 |
| LINK / WETH 0.3% | supernova-cl | 0x059f...ea4e | 9.1209423883 |
| AAVE / LINK 0.3% | uniswap-v4-ethereum | 0x6bca...529b | 9.08128074110463 |
| USDT / LINK 0.01% | uniswap-v4-ethereum | 0xa089...ca2d | 9.14053640974959 |
| SDL / LINK 1% | uniswap_v3 | 0x51d1...1fc3 | 9.0276804495604 |
| LINK / WETH 0.05% | cypher | 0xc0cf...1aae | 9.0996134975 |
| stLINK / LINK | curve | 0x1c89...93b0 | 9.09474629276933 |
| ETH / LINK 1% | uniswap-v4-ethereum | 0x4bc5...4355 | 9.13093846099986 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.