| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| PLSB / USDC 1% | uniswap_v3 | 0xa5ef...531c | 0.02576747211 |
| PLSB / ACR | uniswap_v2 | 0x22d5...b76d | 0.02576908706 |
| ASIC / PLSB 1% | uniswap_v3 | 0xa699...c588 | 0.0267405279628998 |
| PLSB / USDC 1% | uniswap-v4-ethereum | 0x82fc...8ba4 | 0.0259846207 |
| PLSB / WETH | uniswap_v2 | 0x1a0a...a4c0 | 0.02569980177 |
| PLSB / ACR 1% | uniswap-v4-ethereum | 0xeb6d...0841 | 0.02671497121 |
| CARN / PLSB 1% | uniswap-v4-ethereum | 0x0397...6f95 | 0.0276708063657372 |
| CARN / PLSB 0.3% | uniswap_v3 | 0xdb76...15d5 | 0.0260068090042938 |
| ASIC / PLSB 1% | uniswap-v4-ethereum | 0xe316...4af9 | 0.0258069909500273 |
| PLSB / ETH 1% | uniswap-v4-ethereum | 0x4c5f...7cd7 | 0.02535592998 |
| PLSB / pLTC 1% | uniswap_v3 | 0xe396...6069 | 0.02772521884 |
| PLSD / PLSB 1% | uniswap_v3 | 0x446b...c952 | 0.01731335081 |
| ASIC / PLSB 0.3% | uniswap-v4-ethereum | 0x64a9...f674 | 0.03519604928 |
| APE2 / PLSB | uniswap_v2 | 0x28a0...7ae0 | 0.03643967356 |
| PLSB / ACR 0.3% | uniswap_v3 | 0x889a...5056 | 0.02341393701 |
| PLSB / WETH 1% | uniswap_v3 | 0x9145...3b10 | 9.6412049045081 |
| HEX / PLSB 1% | uniswap-v4-ethereum | 0x780d...aa6d | 0.03260142256 |
| PLSD / PLSB 0.3% | uniswap_v3 | 0xa80b...edbd | 0.89570750255050875013046149445544190155052515 |
| HEX / PLSB 0.3% | uniswap_v3 | 0x2bcf...4cdb | 0.01215082724 |
| XBTC / PLSB 1% | uniswap_v3 | 0xdc78...80c1 | 0.031518207637982 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.