| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| PLSB / USDC 1% | uniswap_v3 | 0xa5ef...531c | 0.0108975983671744 |
| ASIC / PLSB 1% | uniswap_v3 | 0xa699...c588 | 0.0110728922711456 |
| PLSB / ACR | uniswap_v2 | 0x22d5...b76d | 0.0108964660441658 |
| PLSB / ACR 1% | uniswap-v4-ethereum | 0xeb6d...0841 | 0.0109502962055339 |
| PLSD / PLSB 1% | uniswap_v3 | 0x446b...c952 | 0.01731335081 |
| CARN / PLSB 1% | uniswap-v4-ethereum | 0x0397...6f95 | 0.0117946224 |
| CARN / PLSB 0.3% | uniswap_v3 | 0xdb76...15d5 | 0.01123412939 |
| ASIC / PLSB 0.3% | uniswap-v4-ethereum | 0x64a9...f674 | 0.01255096207 |
| PLSB / pLTC 1% | uniswap_v3 | 0xe396...6069 | 0.01110231989 |
| ASIC / PLSB 1% | uniswap-v4-ethereum | 0xe316...4af9 | 0.07879239752 |
| APE2 / PLSB | uniswap_v2 | 0x28a0...7ae0 | 0.01298148927 |
| PLSB / WETH 1% | uniswap_v3 | 0x9145...3b10 | 9.6412049045081 |
| PLSB / ACR 0.3% | uniswap_v3 | 0x889a...5056 | 0.01590889756 |
| HEX / PLSB 1% | uniswap-v4-ethereum | 0x780d...aa6d | 0.03260142256 |
| PLSD / PLSB 0.3% | uniswap_v3 | 0xa80b...edbd | 0.89570750255050875013046149445544190155052515 |
| HEX / PLSB 0.3% | uniswap_v3 | 0x2bcf...4cdb | 0.01215082724 |
| XBTC / PLSB 1% | uniswap_v3 | 0xdc78...80c1 | 0.031518207637982 |
| PLSB / USDC 0.3% | uniswap_v3 | 0xfc59...8bf2 | 4.49065426117502 |
| PLSB / WBTC 1% | uniswap_v3 | 0x7421...bb34 | 1.73117121797985647349788674574597080464661578 |
| HEX / PLSB 1% | uniswap_v3 | 0xada7...6e65 | 2.683411519903433999455210642276291648254 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.