| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| PEPE / WETH | uniswap_v2 | 0xa43f...ec9f | 0.000003893047965 |
| PEPE / WETH 0.3% | uniswap_v3 | 0x1195...7b58 | 0.000003891888509 |
| PEPE / ETH 1% | uniswap-v4-ethereum | 0xe42d...61cd | 0.00000391887116 |
| PEPE / ETH 0.3% | uniswap-v4-ethereum | 0x4d29...11ca | 0.000003856150597 |
| PEPE / WETH 1% | uniswap_v3 | 0xf239...c8a6 | 0.000003908172191 |
| PEPE / WETH 1% | pancakeswap-v3-ethereum | 0x3202...1d1b | 0.000003903919674 |
| rust / PEPE 0.3% | uniswap-v4-ethereum | 0x651f...dcce | 0.00000387175485173058 |
| PEPE / VYBN 1% | uniswap_v3 | 0x3868...6be5 | 0.000003882281083 |
| ARRKY / PEPE | uniswap_v2 | 0x8021...5cc8 | 0.00000388453567701628 |
| PEPE / WBTC 0.3% | uniswap_v3 | 0x992c...8417 | 0.000003898407328 |
| PEPE / USDT 0.3% | uniswap_v3 | 0xa7bc...88c5 | 0.000004483698637 |
| PEPE / PROS 1% | uniswap_v3 | 0x950f...eabf | 0.000003860035523 |
| PEPE / WETH 0.05% | cypher | 0xdb90...c640 | 0.000003873095492 |
| ETH / PEPE 2.5% | uniswap-v4-ethereum | 0xecd7...e2c9 | 0.00000389357411356053 |
| PEPE / USDC 1% | uniswap_v3 | 0xcee3...40c7 | 0.000003898693725 |
| PEPE / USDS 0.01% | uniswap_v3 | 0x05b5...3fe6 | 0.000003840050428 |
| PEPE / RONI | uniswap_v2 | 0xa7ce...2554 | 0.000003892306485 |
| PEPE / USDC 1% | uniswap-v4-ethereum | 0x7d69...3d83 | 0.00000390361762 |
| PEPE / MEME 1% | uniswap_v3 | 0xaeae...5ca6 | 0.000003864499582 |
| PEPE / PNKSTR 1% | sushiswap-v3-ethereum | 0x0cac...cedd | 0.000003882953506 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.