| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| PEPE / WETH | uniswap_v2 | 0xa43f...ec9f | 0.00000348536152198855 |
| PEPE / WETH 0.3% | uniswap_v3 | 0x1195...7b58 | 0.00000348375738114911 |
| PEPE / ETH 1% | uniswap-v4-ethereum | 0xe42d...61cd | 0.00000351200618756217 |
| PEPE / USDC 1% | uniswap_v3 | 0xcee3...40c7 | 0.00000351800099907623 |
| PEPE / UNI / WBTC / PANDORA / PROS / waEthUSDC / WLFI 0.3% | balancer-v3-ethereum | 0xb1f6...27c6 | 0.00000343844710855787 |
| PEPE / WETH 1% | uniswap_v3 | 0xf239...c8a6 | 0.00000354784967086031 |
| PEPE / ETH 0.3% | uniswap-v4-ethereum | 0x4d29...11ca | 0.0000034846737118554 |
| PEPE / WETH 0.3% | supernova-cl | 0x6947...2bdb | 0.00000348766394337924 |
| rust / PEPE 0.3% | uniswap-v4-ethereum | 0x651f...dcce | 0.00000351826467375127 |
| PEPE / WBTC 0.3% | uniswap_v3 | 0x992c...8417 | 0.00000347371688483831 |
| PEPE / SHIB 1% | uniswap_v3 | 0x2488...9db1 | 0.00000349464616605609 |
| ARRKY / PEPE | uniswap_v2 | 0x8021...5cc8 | 0.0000035791128291157 |
| PEPE / USDT 0.05% | uniswap-v4-ethereum | 0x1b5f...aab7 | 0.00000346934780142802 |
| ETH / PEPE 2.5% | uniswap-v4-ethereum | 0xecd7...e2c9 | 0.000003556784088743 |
| PEPE / WETH 0.05% | cypher | 0xdb90...c640 | 0.00000351367744992123 |
| PEPE / ZIK 1% | pancakeswap-v3-ethereum | 0x8c77...ece4 | 0.00000350817787798441 |
| PEPE / WETH 1% | pancakeswap-v3-ethereum | 0x3202...1d1b | 0.00000346746373660664 |
| PEPE / USDC 0.3% | uniswap-v4-ethereum | 0x5577...6ff6 | 0.00000346914793186157 |
| GOON / PEPE 1% | uniswap_v3 | 0x955a...31aa | 0.000003568319370997 |
| PEPE / VYBN 1% | uniswap_v3 | 0x3868...6be5 | 0.00000346378243874344 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.