| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| wPE / M2 | uniswap_v2 | 0x9816...8ab7 | 0.0000307887262357944 |
| M2 / WETH 0.01% | uniswap_v3 | 0xc63b...9dc2 | 0.0000326197130527725 |
| M2 / WETH 1% | balancer_ethereum | 0x93ab...2f96 | 0.00003229965309 |
| M2 / USDC | uniswap-v4-ethereum | 0x276d...7853 | 0.0002202596784 |
| M2 / USDC | uniswap-v4-ethereum | 0x5275...462d | 0.00007057353681 |
| M2 / USDC | uniswap-v4-ethereum | 0x1893...ef74 | 0.0002187390119 |
| M2 / USDC | uniswap-v4-ethereum | 0x2330...6ba6 | 0.0001116926518 |
| M2 / USDC | uniswap-v4-ethereum | 0xef50...a7fd | 0.0001998889935 |
| M2 / USDC | uniswap-v4-ethereum | 0x127b...eb36 | 0.0002042650618 |
| M2 / USDC | uniswap-v4-ethereum | 0xc286...cc0a | 0.0002230036797 |
| M2 / USDC | uniswap-v4-ethereum | 0x573d...cbf1 | 0.0002173733504 |
| M2 / USDC | uniswap-v4-ethereum | 0xc75d...4327 | 0.000184646946 |
| M2 / USDC | uniswap-v4-ethereum | 0xaefc...576a | 0.0001869444917 |
| M2 / USDC | uniswap-v4-ethereum | 0x7e1e...3db4 | 0.0001949782023 |
| M2 / USDC | uniswap-v4-ethereum | 0x1663...8e05 | 0.0001972883102 |
| M2 / USDC | uniswap-v4-ethereum | 0xc59f...989a | 0.0001936657565 |
| M2 / USDC | uniswap-v4-ethereum | 0xb95c...8b13 | 0.00008395064044 |
| M2 / USDC | uniswap-v4-ethereum | 0xdc7f...45f4 | 0.0001996813512 |
| M2 / USDC | uniswap-v4-ethereum | 0x35d8...0efd | 0.0001926518375 |
| M2 / USDC | uniswap-v4-ethereum | 0x099f...d4e9 | 0.0001868729481 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.