| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| U / USDT 3.8% | uniswap-v4-ethereum | 0x7b67...6d1b | 0.00344672507777601 |
| U / eU 0.3% | uniswap_v3 | 0xc58e...c5d6 | 0.00369805398020203 |
| U / USDT 1.9% | uniswap-v4-ethereum | 0x962b...3580 | 0.01154453662 |
| U / ETH 5% | uniswap-v4-ethereum | 0xd655...49c5 | 0.01095837821 |
| USDC / U 4.99% | uniswap-v4-ethereum | 0xfd4c...9ada | 0.008009726466 |
| U / USDT 1% | uniswap-v4-ethereum | 0x3ec4...2fcb | 0.006908299698 |
| U / USDT 2.8% | uniswap-v4-ethereum | 0x99a0...671a | 0.004867417586 |
| U / ETH 46% | uniswap-v4-ethereum | 0x29ef...c804 | 0.002900623651 |
| USDC / U 5% | uniswap-v4-ethereum | 0x5e9a...fe5b | 0.008376393457 |
| U / eU 0.01% | uniswap-v4-ethereum | 0xdbe2...dcc8 | 0.009511195309 |
| U / USDT 2% | uniswap-v4-ethereum | 0xffa1...7780 | 0.02374961485 |
| USDC / U 1% | uniswap-v4-ethereum | 0x8322...1c49 | 0.01027446804 |
| U / ETH 4.6% | uniswap-v4-ethereum | 0x55a5...2b36 | 0.00368364843148617 |
| U / USDT 1.8% | uniswap-v4-ethereum | 0xea93...f5fe | 0.01673083867 |
| USDC / U 1% | uniswap-v4-ethereum | 0xb1aa...9002 | 0.009881701455 |
| U / USDT 3% | uniswap-v4-ethereum | 0x98e6...7b31 | 0.005883947567 |
| U / USDT 1.69% | uniswap-v4-ethereum | 0x0530...3200 | 0.01607644633 |
| U / ETH 40% | uniswap-v4-ethereum | 0x54fc...f8e0 | 0.01690743937 |
| U / USDT 2% | uniswap-v4-ethereum | 0x5cad...fe01 | 0.02047558925 |
| USDC / U 88% | uniswap-v4-ethereum | 0xf6b8...35a5 | 0.09394827348 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.