| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ACR / USDC 1% | uniswap_v3 | 0xda59...55bb | 0.00143967058655836 |
| ACR / MT | uniswap_v2 | 0x3c92...d508 | 0.00142783748580163 |
| ASIC / ACR 1% | uniswap-v4-ethereum | 0x1610...86b9 | 0.00141277681501491 |
| PLSB / ACR | uniswap_v2 | 0x22d5...b76d | 0.00142088422589201 |
| ACR / WETH | uniswap_v2 | 0xd3d7...c842 | 0.00144952332190518 |
| ACR / HEX | uniswap_v2 | 0x8dad...d89f | 0.00141504484604079 |
| ACR / USDC | uniswap_v2 | 0xa8ef...c36d | 0.00144315392588963 |
| CARN / ACR 1% | uniswap_v3 | 0x00e8...bab5 | 0.00142779063853333 |
| PLSB / ACR 1% | uniswap-v4-ethereum | 0xeb6d...0841 | 0.00144235679488419 |
| ASIC / ACR | uniswap_v2 | 0x20c3...b664 | 0.00143837715783468 |
| RND / ACR | uniswap_v2 | 0x7b52...de6e | 0.001519779807 |
| ACR / VS | uniswap_v2 | 0x15ae...5acf | 0.00152791822315811 |
| ACR / RM | uniswap_v2 | 0xb647...5760 | 0.001500190754 |
| ACR / SXK | uniswap_v2 | 0x10fe...701f | 0.00149768569999547 |
| ACR / LPM 1% | uniswap_v3 | 0x433a...daf9 | 0.001529008893 |
| ACR / WBTC | uniswap_v2 | 0xb301...6443 | 0.001531151713 |
| ACR / LINK | sushiswap | 0x8a93...14db | 0.001573622034 |
| ACR / DAI | uniswap_v2 | 0xcf96...776b | 0.00144253270790691 |
| ACR / LINK | uniswap_v2 | 0x9381...9098 | 0.001559013955 |
| PLSD / ACR | uniswap_v2 | 0x86d7...7e73 | 0.001512489785 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.