| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| AMZNon / ETH 1% | uniswap-v4-ethereum | 0xae39...bf7d | 207.4701912019 |
| USDC / AMZNon 29% | uniswap-v4-ethereum | 0xdeec...6a1d | 198.529801746 |
| AMZNon / ETH 48% | uniswap-v4-ethereum | 0xfd78...5fd5 | 507.3057926508 |
| USDC / AMZNon 30% | uniswap-v4-ethereum | 0xb057...202d | 197.0926074123 |
| AMZNon / USDT 50% | uniswap-v4-ethereum | 0x639f...3b11 | 514.3365990659 |
| AMZNon / USDT 40% | uniswap-v4-ethereum | 0x6dd1...631e | 188.0021611424 |
| AMZNon / USDC 90% | uniswap-v4-ethereum | 0x96e0...f314 | 2664.9974433653 |
| AAPLon / NVDAon / METAon / MSFTon / GOOGLon / AMZNon / TSLAon 1% | balancer-v3-ethereum | 0x62fb...42f3 | 272.8015706978 |
| AAPLon / NVDAon / METAon / MSFTon / GOOGLon / AMZNon / waEthUSDC / TSLAon 0.3% | balancer-v3-ethereum | 0xf1da...74cc | 261.595086807 |
| AAPLon / NVDAon / METAon / MSFTon / GOOGLon / AMZNon / waEthUSDC / TSLAon 0.5% | balancer-v3-ethereum | 0x8b24...fb50 | 276.2600525716 |
| AAPLon / NVDAon / METAon / aEthUSDC / MSFTon / GOOGLon / AMZNon / TSLAon 0.5% | balancer-v3-ethereum | 0x1b52...e23b | 275.4856127104 |
| AAPLon / NVDAon / METAon / USDC / MSFTon / GOOGLon / AMZNon / TSLAon 0.5% | balancer-v3-ethereum | 0x6a56...e617 | 280.1684044963 |
| QQQon / AAPLon / NVDAon / METAon / MSFTon / GOOGLon / AMZNon / TSLAon 0.5% | balancer-v3-ethereum | 0x4e68...cdcc | 605.597816208 |
| QQQon / AAPLon / NVDAon / METAon / MSFTon / GOOGLon / AMZNon / TSLAon 0.25% | balancer-v3-ethereum | 0xcdf0...acc2 | 608.9609984205 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.