| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ETHCHAN / WETH | uniswap_v2 | 0xb71b...47ef | 0.00000639450043235036 |
| ETHCHAN / ETH 0.8% | uniswap-v4-ethereum | 0xc8bf...83bd | 0.0004637188147 |
| ETHCHAN / ETH 1% | uniswap-v4-ethereum | 0xd409...c1d3 | 0.0002695778411 |
| ETHCHAN / USDC 0.9% | uniswap-v4-ethereum | 0x0be9...36e7 | 0.0003839657242 |
| ETHCHAN / ETH 0.9% | uniswap-v4-ethereum | 0x20e4...65a0 | 0.0003229150451 |
| ETHCHAN / USDC 1% | uniswap_v3 | 0x7714...4e7d | 0.0004032401362 |
| ETHCHAN / USDT 1% | uniswap_v3 | 0x019f...ffc2 | 0.0002639170092 |
| ETHCHAN / WETH 1% | uniswap_v3 | 0x0113...0d7c | 0.0001680734695 |
| ETHCHAN / USDC 2% | uniswap-v4-ethereum | 0x74ca...1216 | 0.0002009693975 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.