| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| SWITCH / WETH 0.3% | uniswap_v3 | 0x2df7...d794 | 0.00026969956229417 |
| WIN / SWITCH 0.3% | uniswap_v3 | 0xff01...94aa | 0.000271111821092707 |
| GROW / SWITCH 0.3% | uniswap-v4-ethereum | 0xdc3d...1ad1 | 0.000272230963713277 |
| SWITCH / WETH 1% | uniswap_v3 | 0x84fe...3a3e | 0.000257365625471172 |
| SWITCH / USDT 12% | uniswap-v4-ethereum | 0x77dd...51e7 | 0.00026087818694184 |
| ELEVATE / SWITCH 0.3% | uniswap-v4-ethereum | 0xb590...5e3a | 0.0001897695912 |
| ELEVATE / SWITCH 0.3% | uniswap-v4-ethereum | 0xd086...fd8e | 0.000241929606554779 |
| USDC / SWITCH 22% | uniswap-v4-ethereum | 0xda04...e54e | 0.000274436615378047 |
| USDC / SWITCH 29.98% | uniswap-v4-ethereum | 0x3fac...5a75 | 0.0001946107492 |
| USDC / SWITCH 49.888% | uniswap-v4-ethereum | 0x3c6b...baa2 | 0.0001006862945 |
| USDC / SWITCH 2% | uniswap-v4-ethereum | 0xb808...f172 | 0.000408725758 |
| USDC / SWITCH 21.9% | uniswap-v4-ethereum | 0xf94b...eac3 | 0.0002713961060811 |
| RALLY / SWITCH 0.3% | uniswap-v4-ethereum | 0x5338...630c | 0.0002040081671 |
| SWITCH / IZE 0.3% | uniswap-v4-ethereum | 0xe5ca...aac0 | 0.0002051440628 |
| ELMT / SWITCH 0.3% | uniswap-v4-ethereum | 0x3ba3...2f9a | 0.0002034585049 |
| RALLY / SWITCH 0.3% | uniswap-v4-ethereum | 0xf1a0...ce41 | 0.0003562210377 |
| GROW / SWITCH 0.3% | uniswap-v4-ethereum | 0xbeb2...4104 | 0.0002042762986 |
| USDC / SWITCH 34.65% | uniswap-v4-ethereum | 0xb521...756a | 0.0001832833982 |
| USDC / SWITCH 25% | uniswap-v4-ethereum | 0x9ae2...7a00 | 0.0002727252613 |
| SWITCH / IZE 0.3% | uniswap_v3 | 0xbed5...9ac0 | 0.0002634304157 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.