| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| wPAW / WETH 1% | pancakeswap-v3-ethereum | 0x50bf...b1d2 | 0.00000000453953967344078 |
| USDC / wPAW | uniswap_v2 | 0x00a7...cef1 | 0.00000000321913305755801 |
| wPAW / TREAT 1% | uniswap-v4-ethereum | 0x00d3...f98c | 0.00000000485841153564398 |
| wPAW / USDT 99.991% | uniswap-v4-ethereum | 0x1a52...e4b1 | 0.0000000005912325212 |
| USDC / wPAW 99.5% | uniswap-v4-ethereum | 0xf0f2...f45f | 0.000000003469310039 |
| wPAW / USDT 99.991% | uniswap-v4-ethereum | 0x385d...eeae | 0.0000000001084804337 |
| wPAW / WETH 0.3% | uniswap_v3 | 0x27ed...cf34 | 0.00000002214883742 |
| wPAW / WETH | uniswap_v2 | 0x54d0...8e05 | 0.00000000222888459466555 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.