| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| U / USDT 3.5% | uniswap-v4-ethereum | 0x47b0...7910 | 0.000708362108 |
| U / USDT 10% | uniswap-v4-ethereum | 0x9653...22d7 | 0.0007795766836 |
| U / USDT 2% | uniswap-v4-ethereum | 0xffa1...7780 | 0.02374961485 |
| U / USDT 3.8% | uniswap-v4-ethereum | 0x7b67...6d1b | 0.004214493643 |
| U / eU 0.3% | uniswap_v3 | 0xc58e...c5d6 | 0.0007693027351 |
| U / USDT 1.9% | uniswap-v4-ethereum | 0x962b...3580 | 0.01154453662 |
| U / ETH 5% | uniswap-v4-ethereum | 0xd655...49c5 | 0.01095837821 |
| USDC / U 4.99% | uniswap-v4-ethereum | 0xfd4c...9ada | 0.008009726466 |
| U / USDT 1% | uniswap-v4-ethereum | 0x3ec4...2fcb | 0.006908299698 |
| U / USDT 2.8% | uniswap-v4-ethereum | 0x99a0...671a | 0.004867417586 |
| U / eU 0.01% | uniswap-v4-ethereum | 0xdbe2...dcc8 | 0.009511195309 |
| USDC / U 5% | uniswap-v4-ethereum | 0x5e9a...fe5b | 0.008376393457 |
| U / ETH 70% | uniswap-v4-ethereum | 0x17a1...0087 | 0.0005465838844 |
| USDC / U 1% | uniswap-v4-ethereum | 0x8322...1c49 | 0.01027446804 |
| USDC / U 1% | uniswap-v4-ethereum | 0xb1aa...9002 | 0.009881701455 |
| U / USDT 1.8% | uniswap-v4-ethereum | 0xea93...f5fe | 0.01673083867 |
| U / ETH 4.6% | uniswap-v4-ethereum | 0x55a5...2b36 | 0.002855364152 |
| U / ETH 90% | uniswap-v4-ethereum | 0x8387...3e8d | 0.0006442009559 |
| U / USDT 3% | uniswap-v4-ethereum | 0x98e6...7b31 | 0.005883947567 |
| U / ETH 46% | uniswap-v4-ethereum | 0x29ef...c804 | 0.002799061108 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.