| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| THALES / USDT 99.941% | uniswap-v4-ethereum | 0x1b70...760e | 0.0900245904500524 |
| THALES / ETH 99.98% | uniswap-v4-ethereum | 0xbb42...a1af | 0.08949387593 |
| THALES / ETH 66% | uniswap-v4-ethereum | 0xacdb...a970 | 0.09658984661 |
| THALES / ETH 85% | uniswap-v4-ethereum | 0x414d...c7d4 | 1.1718114041 |
| THALES / USDC 84.501% | uniswap-v4-ethereum | 0x08a1...dcaa | 0.03172213304 |
| THALES / USDT 99.712% | uniswap-v4-ethereum | 0x1a0a...90be | 0.0905288424677519 |
| THALES / USDC 99.902% | uniswap-v4-ethereum | 0x12b2...f22f | 0.1159132804 |
| THALES / USDC 84.15% | uniswap-v4-ethereum | 0xeddb...80a0 | 0.03789073479 |
| THALES / USDC 99.921% | uniswap-v4-ethereum | 0x0c22...ceed | 0.1287248366 |
| THALES / USDC 85.2% | uniswap-v4-ethereum | 0xa439...1f78 | 0.03717961538 |
| THALES / USDC 99.931% | uniswap-v4-ethereum | 0x28fe...2dce | 0.09841908874 |
| THALES / USDC 84.5% | uniswap-v4-ethereum | 0xfb66...32d3 | 0.04803712441 |
| THALES / USDC 87% | uniswap-v4-ethereum | 0x8c81...7d7f | 6.1510284376 |
| THALES / USDC 86.7% | uniswap-v4-ethereum | 0xbdbd...7776 | 0.1179732849 |
| THALES / USDC 83.5% | uniswap-v4-ethereum | 0x57e0...9208 | 0.05793901114 |
| THALES / ETH 90% | uniswap-v4-ethereum | 0x2144...5d15 | 0.03998916202 |
| THALES / USDC 48.3% | uniswap-v4-ethereum | 0x198e...f8e9 | 0.1328151487 |
| THALES / USDC 73.5% | uniswap-v4-ethereum | 0x6c0e...3156 | 0.0402603258430605 |
| THALES / USDC 84.502% | uniswap-v4-ethereum | 0xff41...9f14 | 0.05176242634 |
| THALES / USDT 99.698% | uniswap-v4-ethereum | 0x50ca...035f | 0.7727889514 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.