| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| SWITCH / WETH 1% | uniswap_v3 | 0x84fe...3a3e | 0.0002052694538 |
| WIN / SWITCH 0.3% | uniswap_v3 | 0xff01...94aa | 0.00019290101146237 |
| GROW / SWITCH 0.3% | uniswap-v4-ethereum | 0xdc3d...1ad1 | 0.00019625354609291 |
| SWITCH / WETH 0.3% | uniswap_v3 | 0x2df7...d794 | 0.0001913753125 |
| INDXL / SWITCH 1% | uniswap-v4-ethereum | 0x0589...eeef | 0.00019636196657954 |
| ELEVATE / SWITCH 0.3% | uniswap-v4-ethereum | 0xb590...5e3a | 0.0001897695912 |
| ELEVATE / SWITCH 0.3% | uniswap-v4-ethereum | 0xd086...fd8e | 0.000250234113540986 |
| ELEVATE / SWITCH 0.3% | uniswap-v4-ethereum | 0x18c8...1162 | 0.0001853359532 |
| USDC / SWITCH 22% | uniswap-v4-ethereum | 0xda04...e54e | 0.0002463065115 |
| USDC / SWITCH 2% | uniswap-v4-ethereum | 0xb808...f172 | 0.0003905727432 |
| USDC / SWITCH 29.98% | uniswap-v4-ethereum | 0x3fac...5a75 | 0.0001946107492 |
| USDC / SWITCH 21.9% | uniswap-v4-ethereum | 0xf94b...eac3 | 0.0001593702002 |
| USDC / SWITCH 49.888% | uniswap-v4-ethereum | 0x3c6b...baa2 | 0.0001006862945 |
| SWITCH / USDT 12% | uniswap-v4-ethereum | 0x77dd...51e7 | 0.0002620244836 |
| RALLY / SWITCH 0.3% | uniswap-v4-ethereum | 0x5338...630c | 0.0002040081671 |
| INDXL / SWITCH 10% | uniswap-v4-ethereum | 0x5d59...37ac | 0.000195996917127993 |
| SWITCH / IZE 0.3% | uniswap-v4-ethereum | 0xe5ca...aac0 | 0.0002051440628 |
| USDC / SWITCH 21.901% | uniswap-v4-ethereum | 0xb67b...619f | 0.000150638947303211 |
| ELMT / SWITCH 0.3% | uniswap-v4-ethereum | 0x3ba3...2f9a | 0.0002034585049 |
| RALLY / SWITCH 0.3% | uniswap-v4-ethereum | 0xf1a0...ce41 | 0.0003562210377 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.