| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| WPLS / WETH 1% | uniswap_v3 | 0xbf9c...699a | 0.0000113382854201401 |
| WPLS / WPLS 1% | uniswap_v3 | 0xf1bd...5fe6 | 0.0000113237582754164 |
| WPLS / WETH | uniswap_v2 | 0xf3cd...2eb8 | 0.0000112249821339915 |
| WPLS / USDC 1% | uniswap_v3 | 0xd32a...bdd9 | 0.0000883032299895711 |
| M3M3 / WPLS | uniswap_v2 | 0x5756...47e8 | 0.00001169062511 |
| WPLS / WETH | 9inch-ethereum | 0x44e2...668b | 0.00001050741458 |
| WPLS / WETH 0.05% | uniswap_v3 | 0xe9b6...8cbb | 0.00001078239844 |
| HEX / WPLS 1% | uniswap_v3 | 0xfe20...2849 | 0.0000599934701586964 |
| WPLS / WETH 0.3% | uniswap_v3 | 0x42bc...c955 | 0.000124635709349007 |
| MATIC / WPLS 0.3% | uniswap_v3 | 0x7bf9...4365 | 0.000165496953314519 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.