| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| APP / USDC | uniswap_v2 | 0x3787...fe15 | 0.000098885985881075 |
| APP / USDT 87% | uniswap-v4-ethereum | 0xaaf3...8697 | 0.000103193699387869 |
| USDC / APP 1% | uniswap_v3 | 0xcac3...d40c | 0.0008573538944 |
| APP / ETH 99.991% | uniswap-v4-ethereum | 0xd9d0...b783 | 0.0004409084484 |
| APP / ETH 99.999% | uniswap-v4-ethereum | 0x15f4...67f6 | 0.0002255029223 |
| USDC / APP 88% | uniswap-v4-ethereum | 0xf8be...e509 | 0.0001112725385 |
| APP / USDT 88% | uniswap-v4-ethereum | 0x9781...532d | 0.0001117688472 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.