| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| LINK / WETH 0.3% | uniswap_v3 | 0xa6cc...93e8 | 14.3150256305066 |
| ETH / LINK 0.3% | uniswap-v4-ethereum | 0xb2b5...e2e4 | 14.2561460800939 |
| LINK / USDC 0.3% | uniswap_v3 | 0xfad5...1559 | 14.3026645105696 |
| stLINK / LINK | curve | 0x7e13...1761 | 14.2132370018884 |
| LINK / WETH 0.05% | uniswap_v3 | 0x5d4f...8c83 | 14.2706148900174 |
| USDC / LINK 0.3% | uniswap-v4-ethereum | 0x50ae...3280 | 14.2555384782097 |
| LINK / WETH | uniswap_v2 | 0xa210...b974 | 14.3114213126894 |
| LINK / WETH | sushiswap | 0xc40d...a967 | 14.1797590239405 |
| AAVE / LINK 0.3% | uniswap_v3 | 0x1424...528a | 14.2855051054259 |
| 1INCH / LINK 0.3% | uniswap_v3 | 0x2802...e4c2 | 14.2302042330436 |
| SDL / LINK 1% | uniswap_v3 | 0x51d1...1fc3 | 14.2776107138703 |
| LINK / PENDLE 1% | uniswap-v4-ethereum | 0x0e83...1171 | 14.1936938251098 |
| LINK / WETH 1% | uniswap_v3 | 0x3a0f...bb65 | 14.1881335293264 |
| ENA / LINK 1% | uniswap_v3 | 0x0383...1aca | 14.2209928096688 |
| ETH / LINK 2% | uniswap-v4-ethereum | 0x6564...6988 | 14.1864528151762 |
| stLINK / LINK | curve | 0x1c89...93b0 | 14.2415528348871 |
| ENS / LINK 1% | uniswap_v3 | 0xb5f7...bf92 | 14.4051626591177 |
| UNI / LINK 0.3% | uniswap_v3 | 0x9f17...550a | 14.1911049057737 |
| LINK / USDT 0.3% | uniswap_v3 | 0xac5a...f0a7 | 14.219372981106 |
| ETH / LINK 1% | uniswap-v4-ethereum | 0x4bc5...4355 | 14.2236086088002 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.