| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| AMZNon / ETH 1% | uniswap-v4-ethereum | 0xae39...bf7d | 242.16780324118 |
| AMZNon / ETH 48% | uniswap-v4-ethereum | 0xfd78...5fd5 | 507.3057926508 |
| USDC / AMZNon 29% | uniswap-v4-ethereum | 0xdeec...6a1d | 232.50357333759 |
| AMZNon / USDT 50% | uniswap-v4-ethereum | 0x639f...3b11 | 514.3365990659 |
| USDC / AMZNon 30% | uniswap-v4-ethereum | 0xb057...202d | 232.183176209454 |
| AMZNon / USDT 40% | uniswap-v4-ethereum | 0x6dd1...631e | 520.2454383893 |
| AMZNon / USDC 90% | uniswap-v4-ethereum | 0x96e0...f314 | 2664.9974433653 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.