| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| Block / USD1 | uniswap_v2 | 0xdabc...938e | 0.0173503519862601 |
| Block / WETH 1% | uniswap_v3 | 0xd193...bd51 | 0.0173507375597566 |
| Block / USDT 1% | uniswap-v4-ethereum | 0xe8e3...434b | 0.04709734164 |
| USDC / Block 1% | uniswap-v4-ethereum | 0xaa42...bfac | 0.04536356975 |
| Block / ETH 1% | uniswap-v4-ethereum | 0xea77...421c | 0.04486767349 |
| Block / ETH 0.36% | uniswap-v4-ethereum | 0x064b...0c09 | 0.06447942804 |
| USD1 / Block 1% | uniswap-v4-ethereum | 0x0adb...0d1c | 0.08275475172 |
| Block / USDT 0.3% | uniswap_v3 | 0x3b6d...eedf | 0.01853749837 |
| Block / USDT 88% | uniswap-v4-ethereum | 0xc174...d347 | 0.007030837082 |
| USDC / Block 0.97% | uniswap-v4-ethereum | 0xf3aa...c416 | 0.07923445878 |
| MNTO / Block 1% | pancakeswap-v3-ethereum | 0x9e10...bb84 | 0.1620409208 |
| USDC / Block 0.9% | uniswap-v4-ethereum | 0x6c81...b58f | 0.07705575623 |
| ETHM / Block 1% | uniswap-v4-ethereum | 0x754b...6361 | 0.04784146425 |
| USDC / Block 0.5% | uniswap-v4-ethereum | 0x88b7...9695 | 0.1378322895 |
| Block / USDT 0.97% | uniswap-v4-ethereum | 0x7b85...f343 | 0.07857328819 |
| USDC / Block 0.3% | uniswap-v4-ethereum | 0xf1e9...9159 | 0.1345469134 |
| Block / WETH 0.3% | uniswap_v3 | 0xecf5...2e48 | 0.2000954398 |
| USD1 / Block 0.3% | uniswap_v3 | 0x2ad7...ea85 | 0.04889636041 |
| Block / WETH 0.01% | uniswap_v3 | 0x0299...c4cb | 0.151311314 |
| Block / USDT 0.9% | uniswap-v4-ethereum | 0x7d10...d947 | 0.08554342429 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.