| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| TERM / waEthUSDC 0.3% | balancer-v3-ethereum | 0xb259...9570 | 0.549157765478321 |
| TERM / ETH 55% | uniswap-v4-ethereum | 0xa4c7...f84b | 0.5208505906 |
| TERM / ETH 23% | uniswap-v4-ethereum | 0xb309...41f3 | 0.2382609878 |
| USDC / TERM 41% | uniswap-v4-ethereum | 0x6201...b5e9 | 0.1839571209 |
| USDC / TERM 48.107% | uniswap-v4-ethereum | 0x6016...212c | 0.3875976823 |
| TERM / USDT 1.5% | uniswap-v4-ethereum | 0x0a16...c13a | 0.3718599385 |
| USDC / TERM 12% | uniswap-v4-ethereum | 0x1d4c...6483 | 0.9248110478 |
| USDC / TERM 0.3% | uniswap-v4-ethereum | 0x675b...3e9b | 0.1686891485 |
| TERM / USDC 0.3% | uniswap_v3 | 0xe7f1...64c8 | 0.3478892099 |
| TERM / ETH 0.3% | uniswap-v4-ethereum | 0x015e...e4be | 0.3380385166 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.