| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| UERII / ETH 0.3% | uniswap-v4-ethereum | 0x21c9...b2b0 | 0.000960110317219743 |
| UERII / WBTC 0.3% | uniswap-v4-ethereum | 0xff1b...4624 | 0.000955776813241099 |
| UERII / USDC 0.3% | uniswap_v3 | 0x8216...62c9 | 0.001102400174 |
| UERII / WBTC 1% | uniswap-v4-ethereum | 0x854e...c237 | 0.0006974698514 |
| USDC / UERII 0.01% | uniswap-v4-ethereum | 0x0c5e...2221 | 0.0010008167 |
| UERII / WETH 0.01% | uniswap_v3 | 0x46df...15d0 | 0.0006691274752 |
| UERII / WETH | uniswap_v2 | 0x6b4a...73f3 | 0.001041631857 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.