| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| MORPHO / ETH 0.3% | uniswap-v4-ethereum | 0xd9f5...7fff | 1.27260753863573 |
| MORPHO / WETH 0.3% | uniswap_v3 | 0xc821...ac53 | 1.2724133789247 |
| MORPHO / USDC 1% | uniswap-v4-ethereum | 0x2bb9...4235 | 1.26638786482825 |
| MORPHO / AAVE 1% | uniswap_v3 | 0xc57c...df07 | 1.28306516256815 |
| MORPHO / AAVE 0.3% | uniswap_v3 | 0x3687...a997 | 1.28306778225143 |
| MORPHO / ZIK 1% | uniswap-v4-ethereum | 0xd190...1a64 | 1.28157651477195 |
| MORPHO / WETH 1% | uniswap_v3 | 0x25b9...ec6f | 1.36778716232989 |
| MORPHO / ETH 1% | uniswap-v4-ethereum | 0xefca...982c | 1.31520586612279 |
| MORPHO / AAVE 0.3% | uniswap-v4-ethereum | 0xd5ef...ddcb | 1.4865305685 |
| MORPHO / USDC 0.95% | uniswap-v4-ethereum | 0x6679...ddbb | 2.1691548877 |
| MORPHO / EIGEN 0.8% | uniswap-v4-ethereum | 0xb5bc...b0ac | 0.9828580633 |
| rust / MORPHO 0.3% | uniswap-v4-ethereum | 0x9d47...6dd1 | 1.1558869572 |
| MORPHO / USDC 0.3% | uniswap-v4-ethereum | 0x80c7...2bed | 1.27882410945982 |
| MORPHO / ETH 0.8% | uniswap-v4-ethereum | 0xe5c6...50ea | 1.9683090176 |
| MORPHO / USDC 1% | uniswap_v3 | 0xe7c4...9da2 | 1.2171922755 |
| MORPHO / sUSDS 0.3% | uniswap-v4-ethereum | 0x96cd...a2d9 | 1.1504150083 |
| MORPHO / USDC 0.05% | uniswap-v4-ethereum | 0x6b77...f19a | 1.2096050147 |
| MORPHO / USDC 0.3% | uniswap_v3 | 0xd622...8f9b | 1.2394724348 |
| MORPHO / KABOSU | uniswap_v2 | 0xa283...91a8 | 1.1734477226 |
| MORPHO / SYRUP 1% | uniswap_v3 | 0x77e2...470e | 1.6318074666 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.