| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| POLS / WETH | uniswap_v2 | 0xffa9...2405 | 0.106259890570761 |
| POLS / USDT | uniswap_v2 | 0xdcdc...fc65 | 0.106129982602346 |
| POLS / USDT 1% | uniswap_v3 | 0x913f...f2e5 | 0.106099192579152 |
| POLS / WETH 0.3% | uniswap_v3 | 0xf538...5985 | 0.105517217330393 |
| VERI / POLS | uniswap_v2 | 0x172c...9d11 | 0.105669661247384 |
| POLS / UNI 0.3% | uniswap_v3 | 0x366c...cc5d | 0.556870712 |
| POLS / UNI | uniswap_v2 | 0xeab9...bc5c | 0.109331641266097 |
| POLS / USDC | uniswap_v2 | 0xc96b...6ad1 | 0.1207386716 |
| POLS / WETH 1% | uniswap_v3 | 0xf30f...ffed | 0.0003033385134 |
| POLS / LINK | uniswap_v2 | 0x4cf8...683a | 0.732146743784413 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.