| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ARB / WETH 0.3% | uniswap_v3 | 0x5935...fbd5 | 0.103681057253671 |
| ARB / ETH 0.3% | uniswap-v4-ethereum | 0xcd05...ccda | 0.104107418116717 |
| ARB / ETH 1% | uniswap-v4-ethereum | 0xb38a...4132 | 0.104236575633261 |
| ARB / WETH 1% | uniswap_v3 | 0x755e...c6ca | 0.101486966928871 |
| ZK / ARB 1% | uniswap-v4-ethereum | 0xc933...df64 | 0.102940344965612 |
| ARB / USDT 1% | uniswap_v3 | 0x54bd...58d2 | 0.100544187469105 |
| ARB / WETH | sushiswap | 0x1af3...f09a | 0.101491446971046 |
| POL / ARB 0.3% | uniswap-v4-ethereum | 0x22db...a6f5 | 0.4988455079 |
| ARB / USDC 1% | uniswap_v3 | 0x42ea...c559 | 0.326582503 |
| HYBX / ARB 1% | uniswap_v3 | 0x09a1...72ef | 0.9362790465967 |
| RNG / ARB 0.3% | uniswap_v3 | 0x6d93...d99d | 0.616658509482168 |
| MATIC / ARB | carbon-defi-ethereum | 0xc537...1-18 | 0.098587587253378 |
| ARB / SUSHI | sushiswap | 0x43de...b9d2 | 0.103734232616518 |
| ARB / USDT 0.05% | uniswap-v4-ethereum | 0xc5cb...1789 | 0.113160077920177 |
| ARB / USDT 0.3% | uniswap-v4-ethereum | 0x7cd0...3d68 | 0.2375528055 |
| ARB / USDT 0.3% | uniswap_v3 | 0x7af0...b545 | 0.251340494 |
| MATIC / ARB 0.3% | uniswap-v4-ethereum | 0xd7ea...3376 | 0.3868591378 |
| ARB / DAI 1% | uniswap_v3 | 0x9939...3a09 | 1.742406986353401784283581412853 |
| ARMCP / ARB 0.3% | uniswap_v3 | 0x9f9e...302b | 0.4897383952 |
| DRAGONX / ARB 1% | uniswap_v3 | 0x446f...6a9d | 0.508598795682593 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.