| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| NIL / USDC 0.3% | uniswap-v4-ethereum | 0xc63e...0b91 | 0.03463983644 |
| NIL / ETH 0.3% | uniswap-v4-ethereum | 0xee31...812c | 0.03482359965 |
| NIL / USDT 2% | uniswap-v4-ethereum | 0x6d4a...83bd | 0.03742055858 |
| NIL / USDT 1% | uniswap-v4-ethereum | 0x6580...08be | 0.03961091082 |
| NIL / USDT 1.75% | uniswap-v4-ethereum | 0x61f1...3060 | 0.03900280279 |
| NIL / USDT 0.7% | uniswap-v4-ethereum | 0x5c3d...d481 | 0.03825692506 |
| NIL / ETH 0.01% | uniswap-v4-ethereum | 0x8c50...98b4 | 0.06959000506 |
| NIL / USDC 0.01% | uniswap-v4-ethereum | 0x5022...9952 | 0.07461873101 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.