| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| sPEG / ETH 0.3% | uniswap-v4-ethereum | 0xa385...8be2 | 0.8650351411 |
| sPEG / USDC 48% | uniswap-v4-ethereum | 0xfb72...3fef | 1.6552630666 |
| sPEG / USDC 99% | uniswap-v4-ethereum | 0xa813...6cfb | 2.7405864926 |
| sPEG / ETH 26% | uniswap-v4-ethereum | 0xd97a...ec85 | 8.0826595785 |
| sPEG / ETH 22% | uniswap-v4-ethereum | 0x170b...550c | 10.603450507 |
| sPEG / ETH 48% | uniswap-v4-ethereum | 0x7e70...7e5b | 1.7440820933 |
| sPEG / ETH 20% | uniswap-v4-ethereum | 0xaacc...97f9 | 11.61259214 |
| sPEG / USDC 69% | uniswap-v4-ethereum | 0xb0c6...48ea | 2.3134477125 |
| sPEG / USDC 50% | uniswap-v4-ethereum | 0x262d...226b | 2.638207281 |
| sPEG / ETH 50% | uniswap-v4-ethereum | 0xdecd...a9c7 | 4.0140562303 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.