| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| CSPC / ETH 0.3% | uniswap-v4-ethereum | 0x89c7...ee82 | 0.000000485422947655782 |
| CSPC / USDC 0.3% | uniswap-v4-ethereum | 0xd317...ecc7 | 0.000000494976257944031 |
| CSPC / WETH 1% | pancakeswap-v3-ethereum | 0x28c6...c1f3 | 0.0000004514899177 |
| CSPC / WETH 1% | sushiswap-v3-ethereum | 0x2113...90df | 0.0000004466962622 |
| CSPC / USDC 1% | sushiswap-v3-ethereum | 0xffb2...8be5 | 0.000000476917723162314 |
| CSPC / USDC 1% | pancakeswap-v3-ethereum | 0x7e96...f9ec | 0.0000004609508927 |
| CSPC / USDT 0.3% | uniswap-v4-ethereum | 0xede6...dda1 | 0.0000008511217371 |
| DAI / CSPC 0.3% | uniswap-v4-ethereum | 0xdfd3...2d19 | 0.0000009076230493 |
| CSPC / SUSHI 1% | uniswap-v4-ethereum | 0x541e...3eb8 | 0.01268367627 |
| CSPC / ETH 1% | uniswap-v4-ethereum | 0xa507...cee5 | 0.0000001376017189 |
| CSPC / SUSHI 1% | pancakeswap-v3-ethereum | 0xa558...6f8c | 0.0000001041635823 |
| CSPC / WETH | pancakeswap_ethereum | 0x873b...46e3 | 0.00001495637899 |
| CSPC / WBTC 0.25% | pancakeswap-v3-ethereum | 0x3a85...3a0c | 0.0001421584357 |
| CSPC / WBTC 0.3% | sushiswap-v3-ethereum | 0xfbd7...ab12 | 0.00001836021019 |
| GHO / CSPC 0.3% | sushiswap-v3-ethereum | 0x75ff...4659 | 0.0000004328883107 |
| CSPC / USDC 0.25% | pancakeswap-v3-ethereum | 0x771e...8a25 | 0.000001273197123 |
| CSPC / WETH 0.25% | pancakeswap-v3-ethereum | 0xe780...5dba | 0.00002172689428 |
| DAI / CSPC 0.25% | pancakeswap-v3-ethereum | 0x18e8...2d27 | 0.000009135859475 |
| Cake / CSPC 1% | pancakeswap-v3-ethereum | 0xca03...90c6 | 0.00000006741800506 |
| CSPC / UNI 1% | pancakeswap-v3-ethereum | 0x5698...9651 | 0.000001109920185 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.