| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| FLASH / WETH 1% | uniswap_v3 | 0xc06b...de82 | 0.1899975984 |
| FLASH / WETH | uniswap_v2 | 0xb1c3...a698 | 0.0000883237096113438 |
| FLASH / USDT | uniswap-v4-ethereum | 0x783e...47fa | 0.0002629785906 |
| FLASH / WETH 0.3% | uniswap_v3 | 0xea07...866b | 0.359432496845705 |
| LUSD / FLASH 1% | uniswap_v3 | 0xc46f...3177 | 0.1152458124998747769973171922252 |
| FLASH / USDC 1% | uniswap_v3 | 0x789b...071d | 0.00418289776542593 |
| FLASH / USDC 0.05% | uniswap_v3 | 0x169a...4afa | 0.1625839329613857681746943497415 |
| FLASH / USDC | uniswap_v2 | 0x04da...e29d | 0.0447576899665772 |
| XIO / FLASH | uniswap_v2 | 0x0201...4cf9 | 0.155679230903354604528352094461153425727209119073127665409206796026772309502106842215639121 |
| LUSD / FLASH 0.05% | uniswap_v3 | 0xe220...6b0d | 0.1182402841618616510226466544848 |
| fUSDC-6e5e / FLASH 1% | uniswap_v3 | 0x753d...2fba | 0.0111096893361464 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.