| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| USD1 / USDC 0.01% | uniswap_v3 | 0x1e1d...ce28 | 0.998242150982916 |
| USD1 / USDT 0.01% | uniswap_v3 | 0x185a...1f11 | 0.996070961585552 |
| Block / USD1 | uniswap_v2 | 0xdabc...938e | 0.999986703754517 |
| DOLO / USD1 0.3% | uniswap-v4-ethereum | 0x2d97...27ea | 0.999069066615723 |
| B / USD1 | uniswap_v2 | 0xd567...dafa | 0.998296296992081 |
| USD1 / WETH 0.3% | uniswap_v3 | 0xef53...a7df | 1.00235123847868 |
| USD1 / USDf 0.01% | uniswap_v3 | 0xb0f1...e89b | 1.00039835361259 |
| USD1 / WLFI 0.3% | uniswap_v3 | 0x4637...c73d | 0.998242523421412 |
| USD1 / BabyWLFI | uniswap_v2 | 0x7bca...af7d | 0.997265091276801 |
| EAGLE / USD1 1% | uniswap_v3 | 0xa90e...b549 | 0.996391617980847 |
| CLUTCH / USD1 1% | uniswap_v3 | 0x22a8...a736 | 0.999524043039008 |
| AMERICA / USD1 1% | uniswap_v3 | 0x6c2f...9fd7 | 0.998575020163779 |
| USD1 / WLFI 1% | uniswap_v3 | 0xf9f5...c85d | 0.9928997222077 |
| USD1 / ETH 0.3% | uniswap-v4-ethereum | 0xd089...c5f8 | 1.00362812930176 |
| TRUTH / USD1 1% | uniswap_v3 | 0x0a37...24f3 | 1.0015550912 |
| USD1 / TRUTH 1% | uniswap_v3 | 0x7505...bbbf | 1.0001768721 |
| E / USD1 0.3% | uniswap_v3 | 0x3fd5...7814 | 0.9986336591 |
| USD1 / WLFI 0.99% | uniswap-v4-ethereum | 0x88e8...7056 | 1.0018189392 |
| USD1 / PROS 0.3% | balancer-v3-ethereum | 0x0559...1bf6 | 1.0029458062 |
| ERC-47 / USD1 | uniswap_v2 | 0x903e...d240 | 0.998379098003171 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.