| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| USD1 / USDC 0.01% | uniswap_v3 | 0x1e1d...ce28 | 1.00099879896776 |
| USD1 / USDT 0.01% | uniswap_v3 | 0x185a...1f11 | 0.997505045601683 |
| USD1 / USDf 0.01% | uniswap_v3 | 0xb0f1...e89b | 1.00286224731105 |
| DOLO / USD1 0.3% | uniswap-v4-ethereum | 0x2d97...27ea | 1.00103050846246 |
| Block / USD1 | uniswap_v2 | 0xdabc...938e | 0.999334745001587 |
| USD1 / WETH 0.3% | uniswap_v3 | 0xef53...a7df | 1.00120588489585 |
| USD1 / WLFI 0.3% | uniswap_v3 | 0x4637...c73d | 1.0019939863196 |
| EAGLE / USD1 1% | uniswap_v3 | 0xa90e...b549 | 1.00326328220593 |
| USD1 / BabyWLFI | uniswap_v2 | 0x7bca...af7d | 0.998766784102831 |
| L / USD1 0.01% | uniswap-v4-ethereum | 0x5c55...6d58 | 1.00250203416611 |
| ERC-47 / USD1 | uniswap_v2 | 0x903e...d240 | 0.997890352970771 |
| USD1 / WLFI 1% | uniswap_v3 | 0xf9f5...c85d | 1.0019939863196 |
| USD1 / ETH 0.3% | uniswap-v4-ethereum | 0xd089...c5f8 | 1.00733872141339 |
| USD1 / WLFI 0.3% | uniswap-v4-ethereum | 0x7ccd...5888 | 1.00242094737046 |
| TRUTH / USD1 1% | uniswap_v3 | 0x0a37...24f3 | 1.0015550912 |
| AMERICA / USD1 1% | uniswap_v3 | 0x6c2f...9fd7 | 0.9989167784 |
| USD1 / TRUTH 1% | uniswap_v3 | 0x7505...bbbf | 1.0001768721 |
| tst / USD1 1% | uniswap_v3 | 0x6e49...9118 | 1.0040022263 |
| CLUTCH / USD1 1% | uniswap_v3 | 0x22a8...a736 | 1.00044466308145 |
| USD1 / WLFI 0.99% | uniswap-v4-ethereum | 0x88e8...7056 | 1.0018189392 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.