| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| PEPE / WETH | uniswap_v2 | 0xa43f...ec9f | 0.00000471931111323702 |
| PEPE / WETH 0.3% | uniswap_v3 | 0x1195...7b58 | 0.00000471534912820605 |
| PEPE / ETH 1% | uniswap-v4-ethereum | 0xe42d...61cd | 0.00000470084168514656 |
| PEPE / USDT 0.05% | uniswap_v3 | 0x9b96...d3d0 | 0.00000470697021701468 |
| PEPE / UNI / WBTC / PANDORA / PROS / waEthUSDC / WLFI 0.3% | balancer-v3-ethereum | 0xb1f6...27c6 | 0.00000463406329 |
| PEPE / USDT 0.3% | uniswap_v3 | 0xa7bc...88c5 | 0.00000469737282258311 |
| PEPE / ETH 0.3% | uniswap-v4-ethereum | 0x4d29...11ca | 0.00000472233146589835 |
| PEPE / WETH 1% | uniswap_v3 | 0xf239...c8a6 | 0.00000471404451324508 |
| rust / PEPE 0.3% | uniswap-v4-ethereum | 0x651f...dcce | 0.00000470200606129532 |
| PEPE / WBTC 0.3% | uniswap_v3 | 0x992c...8417 | 0.00000474502436121409 |
| PEPE / USDC 1% | uniswap_v3 | 0xcee3...40c7 | 0.00000473288424906393 |
| PEPE / SHIB 1% | uniswap_v3 | 0x2488...9db1 | 0.00000486220584645467 |
| ARRKY / PEPE | uniswap_v2 | 0x8021...5cc8 | 0.00000475870749890344 |
| PEPE / WETH 1% | pancakeswap-v3-ethereum | 0x3202...1d1b | 0.00000473968765759147 |
| PEPE / SEXY 1% | uniswap_v3 | 0x81dd...de4d | 0.0000047286912964469 |
| PEPE / VYBN 1% | uniswap_v3 | 0x3868...6be5 | 0.00000471737225992373 |
| PEPE / PNKSTR 1% | sushiswap-v3-ethereum | 0x0cac...cedd | 0.0000047787780703354 |
| PEPE / USDT 0.05% | uniswap-v4-ethereum | 0x1b5f...aab7 | 0.00000474514031846182 |
| GOON / PEPE 1% | uniswap_v3 | 0x955a...31aa | 0.00000475041801607848 |
| PEPE / Toil 1% | uniswap_v3 | 0x2d77...fbba | 0.00000477668149497683 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.