| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| UNIDX / WETH | solidlydex | 0x0f3b...ca0a | 0.000389600131 |
| UNIDX / WETH 2% | kyberswap_elastic | 0xa6a0...cbf1 | 8.0241759182566792966528287432 |
| UNIDX / WETH 1% | uniswap_v3 | 0x3688...4ca4 | 2.6876400384 |
| UNIDX / USDC 25% | uniswap-v4-ethereum | 0xc47b...72df | 0.0005232969634 |
| UNIDX / WETH | orion-ethereum | 0xef5a...6418 | 0.0003934458339 |
| UNIDX / WETH | uniswap_v2 | 0xe236...950d | 0.0007167152031 |
| UNIDX / WETH 0.3% | uniswap_v3 | 0x5f4b...08d9 | 0.000000331471857024188422365520283226349875101200839508636 |
| UNIDX / WETH 0.01% | uniswap_v3 | 0x6587...bf8e | 2025.368183526323333738406970038598 |
| LUSD / UNIDX 1% | uniswap_v3 | 0xc76e...ccf9 | 6.53525736288495098414335400962 |
| UNIDX / WETH | sushiswap | 0x7e38...755e | 185814.440912677 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.