| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ARKM / WETH 1% | uniswap_v3 | 0x9cb9...f841 | 0.196287426519385 |
| POL / ARKM 1% | uniswap_v3 | 0x6d74...c826 | 0.196315108214024 |
| ARKM / USDC 0.01% | uniswap-v4-ethereum | 0xd6d1...4c57 | 0.192396509094925 |
| ARKM / ETH 51% | uniswap-v4-ethereum | 0xed87...e535 | 0.302046215 |
| ARKM / ETH 90% | uniswap-v4-ethereum | 0xb7c2...4ebe | 0.0265188281 |
| ARKM / ETH 40% | uniswap-v4-ethereum | 0x7728...0598 | 0.5246089454 |
| ARKM / USDT 70% | uniswap-v4-ethereum | 0x3ca9...f3a4 | 0.1274661531 |
| POL / ARKM 1% | uniswap-v4-ethereum | 0x8780...a2ff | 0.3515718205 |
| ARKM / ETH 0.3% | uniswap-v4-ethereum | 0xa934...3a62 | 0.3179504659 |
| ARKM / WETH | uniswap_v2 | 0x893a...fa35 | 0.186422827541146 |
| ARKM / KABOSU | uniswap_v2 | 0xe372...5d66 | 0.189031608057955 |
| ARKM / TITANX | uniswap_v2 | 0x4131...f713 | 0.2236114377 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.