| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| PEPE / WETH | uniswap_v2 | 0xa43f...ec9f | 0.00000519465870348529 |
| PEPE / WETH 0.3% | uniswap_v3 | 0x1195...7b58 | 0.00000519775801476937 |
| PEPE / USDT 0.3% | uniswap-v4-ethereum | 0x89c1...6412 | 0.00000521636466862585 |
| PEPE / ETH 1% | uniswap-v4-ethereum | 0xe42d...61cd | 0.00000515353286793189 |
| PEPE / USDT 0.05% | uniswap_v3 | 0x9b96...d3d0 | 0.00000516561896547006 |
| PEPE / WETH 1% | uniswap_v3 | 0xf239...c8a6 | 0.00000525119532994231 |
| PEPE / UNI / WBTC / PANDORA / PROS / waEthUSDC / WLFI 0.3% | balancer-v3-ethereum | 0xb1f6...27c6 | 0.00000516798558392474 |
| PEPE / ETH 0.3% | uniswap-v4-ethereum | 0x4d29...11ca | 0.00000521720812316481 |
| rust / PEPE 0.3% | uniswap-v4-ethereum | 0x651f...dcce | 0.00000519584825829612 |
| PEPE / USDT 0.3% | uniswap_v3 | 0xa7bc...88c5 | 0.00000520941261851957 |
| PEPE / WBTC 0.3% | uniswap_v3 | 0x992c...8417 | 0.00000512638516201632 |
| PEPE / USDC 1% | uniswap_v3 | 0xcee3...40c7 | 0.00000518339615821822 |
| PEPE / SHIB 1% | uniswap_v3 | 0x2488...9db1 | 0.00000520033002106779 |
| ARRKY / PEPE | uniswap_v2 | 0x8021...5cc8 | 0.00000515237765705825 |
| ETH / PEPE 2.5% | uniswap-v4-ethereum | 0xecd7...e2c9 | 0.00000520027687064141 |
| PEPE / Toil 1% | uniswap_v3 | 0x2d77...fbba | 0.00000522247528465318 |
| PEPE / WETH 0.05% | cypher | 0xdb90...c640 | 0.00000517655475329492 |
| GOON / PEPE 1% | uniswap_v3 | 0x955a...31aa | 0.00000519853589899058 |
| PEPE / VYBN 1% | uniswap_v3 | 0x3868...6be5 | 0.00000527415858486289 |
| PEPE / USDC | antfarm-ethereum | 0x196a...7372 | 0.00000605278066259172 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.