| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| USD1 / USDT 0.01% | uniswap_v3 | 0x185a...1f11 | 0.9961029788 |
| DOLO / USD1 0.3% | uniswap-v4-ethereum | 0x2d97...27ea | 0.994504403390406 |
| Block / USD1 | uniswap_v2 | 0xdabc...938e | 1.00193465911841 |
| USD1 / USDC 0.01% | uniswap_v3 | 0x1e1d...ce28 | 1.0017424493 |
| USD1 / WLFI 0.3% | uniswap_v3 | 0x4637...c73d | 0.9961036087 |
| USD1 / WETH 0.3% | uniswap_v3 | 0xef53...a7df | 1.0021538213 |
| USD1 / BabyWLFI | uniswap_v2 | 0x7bca...af7d | 1.0019066681 |
| USD1 / FANC 1% | uniswap-v4-ethereum | 0x3a54...73df | 0.9968321223 |
| L / USD1 0.01% | uniswap-v4-ethereum | 0x5c55...6d58 | 0.996559340024976 |
| USD1 / ETH 0.3% | uniswap-v4-ethereum | 0xd089...c5f8 | 0.9949019122 |
| USD1 / WLFI 1% | uniswap_v3 | 0xf9f5...c85d | 1.0008902644 |
| USD1 / WLFI 0.3% | uniswap-v4-ethereum | 0x7ccd...5888 | 0.9988976337 |
| AMERICA / USD1 1% | uniswap_v3 | 0x6c2f...9fd7 | 0.9966274685 |
| TRUTH / USD1 1% | uniswap_v3 | 0x0a37...24f3 | 1.0015550912 |
| USD1 / TRUTH 1% | uniswap_v3 | 0x7505...bbbf | 1.0001768721 |
| tst / USD1 1% | uniswap_v3 | 0x6e49...9118 | 1.0040022263 |
| EAGLE / USD1 1% | uniswap_v3 | 0xa90e...b549 | 0.99929894821916 |
| CLUTCH / USD1 1% | uniswap_v3 | 0x22a8...a736 | 0.996196176843088 |
| USD1 / WLFI 0.99% | uniswap-v4-ethereum | 0x88e8...7056 | 1.0018189392 |
| ERC-47 / USD1 | uniswap_v2 | 0x903e...d240 | 0.99716631356675 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.