| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| EDGE / USDC 0.7% | uniswap-v4-ethereum | 0x3bba...9973 | 0.8915933341 |
| EDGE / USDT 0.75% | uniswap-v4-ethereum | 0x428b...5fa0 | 0.8873601472 |
| EDGE / USDT 0.66% | uniswap-v4-ethereum | 0x23d8...0a87 | 0.8885602523 |
| EDGE / USDC 0.66% | uniswap-v4-ethereum | 0x3f04...6f72 | 0.8914340113 |
| EDGE / ETH 0.111% | uniswap-v4-ethereum | 0x0ee6...1e81 | 0.9178625112 |
| EDGE / ETH 1% | uniswap-v4-ethereum | 0x6307...d3bc | 0.8731983348 |
| EDGE / USDC 0.255% | uniswap-v4-ethereum | 0x4118...3780 | 0.8923846807 |
| EDGE / USDT 77% | uniswap-v4-ethereum | 0x79e6...7521 | 0.1164374993 |
| EDGE / USDT 10% | uniswap-v4-ethereum | 0x5525...4de9 | 0.8654473266 |
| EDGE / USDC 0.99% | uniswap-v4-ethereum | 0x1caf...a870 | 0.530959464 |
| EDGE / USDT 0.93% | uniswap-v4-ethereum | 0x15d8...b9ad | 0.7833091119 |
| EDGE / ETH 0.2% | uniswap-v4-ethereum | 0x2ee8...7dc5 | 1.0812636274 |
| EDGE / USDT 8% | uniswap-v4-ethereum | 0x6dfc...2ca5 | 0.5442794941 |
| EDGE / USDC 0.693% | uniswap-v4-ethereum | 0x0953...8f41 | 0.5273513036 |
| EDGE / ETH 0.5% | uniswap-v4-ethereum | 0x3e67...7f2f | 1.0430301879 |
| EDGE / USDT 10.02% | uniswap-v4-ethereum | 0x4dc7...c05a | 0.6298472502 |
| EDGE / USDT 0.743% | uniswap-v4-ethereum | 0xa76b...ff76 | 0.5076241918 |
| EDGE / USDT 1% | uniswap-v4-ethereum | 0xebfc...4642 | 0.7263007222 |
| EDGE / USDT 9.33% | uniswap-v4-ethereum | 0x2887...d36f | 0.6945552791 |
| EDGE / USDC 1.992% | uniswap-v4-ethereum | 0xd6ed...3bcc | 0.6789417905 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.