| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| HFT / WETH 1% | uniswap_v3 | 0xe67b...7493 | 0.01671636718 |
| HFT / USDC 0.3% | uniswap_v3 | 0xe1e7...a1c3 | 0.59768050244725426796007057264 |
| HFT / USDT 99.961% | uniswap-v4-ethereum | 0xc3da...65f7 | 0.00180653246 |
| HFT / USDT 99.99% | uniswap-v4-ethereum | 0xf510...0946 | 0.003809604153 |
| HFT / USDT 40% | uniswap-v4-ethereum | 0x2faf...f13c | 0.01965550196 |
| HFT / USDC 96.36% | uniswap-v4-ethereum | 0xf38f...deae | 0.009077878232 |
| USDC / HFT 88.5% | uniswap-v4-ethereum | 0x1f23...d50a | 0.006771574363 |
| HFT / USDT 95.2% | uniswap-v4-ethereum | 0x29ff...b935 | 0.005383507055 |
| HFT / USDT 95.3% | uniswap-v4-ethereum | 0x7fab...948e | 0.1067975623 |
| HFT / ETH 99.9% | uniswap-v4-ethereum | 0x51f9...7465 | 0.005763194606 |
| HFT / USDT 95% | uniswap-v4-ethereum | 0x276d...2b5a | 0.009299041583 |
| HFT / USDT 88% | uniswap-v4-ethereum | 0xf205...9ab3 | 0.005703919102 |
| USDC / HFT 30% | uniswap-v4-ethereum | 0x2b12...a30e | 0.03203135605 |
| USDC / HFT 79% | uniswap-v4-ethereum | 0x646a...7425 | 0.01506020882 |
| HFT / USDC 26.65% | uniswap-v4-ethereum | 0x3756...b78d | 0.01762505452 |
| HFT / USDC 9.95% | uniswap-v4-ethereum | 0xb2be...0125 | 0.1633188635 |
| HFT / USDC 21.53% | uniswap-v4-ethereum | 0x3323...9f0c | 0.01408256241 |
| HFT / USDT 5% | uniswap-v4-ethereum | 0x6fd1...0903 | 0.01508106321 |
| HFT / USDT 0.05% | uniswap_v3 | 0xa467...a29e | 0.04315585184 |
| USDC / HFT 88.2% | uniswap-v4-ethereum | 0x446d...9afe | 0.01100013126 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.