| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| WPLS / WETH 1% | uniswap_v3 | 0x8cd6...096d | 0.0000166919044306355 |
| WPLS / 9INCH | 9inch-ethereum | 0x66f7...786f | 0.0000171495767863781 |
| WPLS / WETH | 9inch-ethereum | 0xc6ce...5c6f | 0.0000169888139129374 |
| WPLS / WETH 0.3% | uniswap_v3 | 0x4a29...f08b | 0.000016575325122808 |
| WPLS / ETH 1% | uniswap-v4-ethereum | 0xd366...24fc | 0.0000166926412720126 |
| WPLS / WPLS 1% | uniswap_v3 | 0xf1bd...5fe6 | 0.000017132455224684 |
| EXPERIMENT / WPLS | uniswap_v2 | 0x3907...c1b3 | 0.0000166567353641491 |
| WPLS / 🖨️ | uniswap_v2 | 0x6fb8...7113 | 0.0000159869629185882 |
| WPLS / WETH | uniswap_v2 | 0xddbf...f353 | 0.0000159143748484856 |
| WPLS / SWAP 1% | uniswap-v4-ethereum | 0x30cf...fc9b | 0.00002770787221 |
| WPLS / USDT 0.3% | uniswap_v3 | 0x7f04...407c | 0.0000473735259 |
| WPLS / ETH 2% | uniswap-v4-ethereum | 0xa347...3854 | 0.00002697728387 |
| WPLS / TEXAN 1% | uniswap_v3 | 0x025b...ff11 | 0.00002221695714 |
| PLSX / WPLS 1% | uniswap-v4-ethereum | 0x4a25...f49f | 0.00003860621358 |
| WPLS / 🖨️ 1% | uniswap-v4-ethereum | 0xf44e...2e5e | 0.00001940132721 |
| HEX / WPLS 1% | uniswap-v4-ethereum | 0x94d9...d9f1 | 0.00002434990002 |
| DAI / WPLS 1% | uniswap-v4-ethereum | 0xd8d9...0802 | 0.00004144380576 |
| PLSX / WPLS 1% | uniswap-v4-ethereum | 0x9d07...fe8c | 0.00002158572637 |
| PLSX / WPLS 1% | uniswap_v3 | 0x2c7d...5bef | 0.00002221695714 |
| HEX / WPLS 1% | uniswap_v3 | 0xcd08...3498 | 0.00003612098824 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.