| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ARPA / WETH | uniswap_v2 | 0xb569...ec45 | 0.010199909814257 |
| ARPA / USDT 80% | uniswap-v4-ethereum | 0x8e23...f7ae | 0.03216023873 |
| ARPA / ETH 50% | uniswap-v4-ethereum | 0x929a...4caa | 0.00675482984 |
| ARPA / USDT | uniswap_v2 | 0x9f62...0808 | 0.0104660356537223 |
| BOBA / ARPA | uniswap_v2 | 0x9fe2...ad34 | 0.0190709686684025 |
| USDC / ARPA 9.99% | uniswap-v4-ethereum | 0x6d83...2b9f | 0.02061514619 |
| USDC / ARPA 88.5% | uniswap-v4-ethereum | 0x575b...b0e3 | 0.00809465317439012 |
| ARPA / ETH 1% | uniswap-v4-ethereum | 0x544c...c0b7 | 0.02162509687 |
| ARPA / USDC 1% | uniswap_v3 | 0x885b...c5ef | 0.0384163723550556 |
| ARPA / WETH 1% | uniswap_v3 | 0xfa16...62a0 | 0.02269923605 |
| ARPA / KABOSU | uniswap_v2 | 0x4954...9370 | 0.01225147699 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.