| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| PROS / WETH 0.3% | uniswap_v3 | 0x062b...31c0 | 0.0345128010144013 |
| PROS / USDT / WBTC | curve | 0xdae4...e55c | 0.03414410768307713766400229994647258857538987272398446806842462255 |
| PROS / WBTC / PNKSTR 0.3% | balancer-v3-ethereum | 0xcc97...e69c | 0.0344366628323376 |
| PROS / WETH | curve | 0x2c78...d34c | 0.03432649388607154035994392150414203481500033959947407185504749846 |
| crvUSD / PROS | curve | 0x440f...8b34 | 0.0340468824012662 |
| CRV / PROS | curve | 0x1f57...865f | 0.0342873938695651343195083133469537356850978779759880923566236155 |
| USDT / PROS | curve | 0x6bd6...2f22 | 0.0339030714596016 |
| PNKSTR / PROS | curve | 0x0c37...7bdc | 0.0344711254889282339089760734874727632145511723701898959225571293 |
| PEPE / UNI / WBTC / PANDORA / PROS / waEthUSDC / WLFI 0.3% | balancer-v3-ethereum | 0xb1f6...27c6 | 0.00000463406329 |
| PAXG / PROS 0.3% | balancer-v3-ethereum | 0x4155...4a84 | 0.0342954584804666 |
| USDT-PROS / PROS 0.3% | sushiswap-v3-ethereum | 0x3494...1a60 | 0.0344352511360188 |
| PROS / crvUSD 0.3% | balancer-v3-ethereum | 0x7744...4537 | 0.0342214941652064 |
| PROS / WETH | justmoney-ethereum | 0x206e...81dc | 0.0343478610023787 |
| PROS / WLFI 0.3% | uniswap-v4-ethereum | 0x016c...dcac | 0.0345009235625291 |
| PROS / WBTC 0.3% | uniswap-v4-ethereum | 0x7757...f2af | 0.0344124635761968 |
| PROS / USDT | justmoney-ethereum | 0xa860...07b3 | 0.0345461106650931 |
| PROS / WBTC | justmoney-ethereum | 0x8afd...ce8b | 0.0344569772266048 |
| PROS / WBTC 0.25% | pancakeswap-v3-ethereum | 0x18f3...9ad3 | 0.0342990248651587 |
| PANDORA / PROS | justmoney-ethereum | 0xe3b7...230c | 0.0345974090597926 |
| USDC / PROS | curve | 0x36c9...e580 | 0.034588998069824 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.