| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| PSP / WETH 0.1% | balancer_ethereum | 0xcb0e...061d | 0.0061044176134615 |
| PSP / WETH | sushiswap | 0x458a...1687 | 0.00627236516991358 |
| PSP / WETH 1% | uniswap_v3 | 0x4a73...bf2a | 0.03097105266 |
| GHO / PSP 0.001% | balancer_ethereum | 0x0061...e339 | 0.02215317341 |
| PSP / ETH 1% | uniswap-v4-ethereum | 0x503a...f5d8 | 0.006045406109 |
| PSP / USDC 0.3% | uniswap_v3 | 0x2739...ced2 | 0.009034947733 |
| PSP / WETH 0.3% | uniswap_v3 | 0x60a6...026e | 0.000000000000002351824234362910688520431791064850365427881980834002 |
| PSP / WETH | uniswap_v2 | 0xa541...1d5f | 0.006664514826 |
| PSP / USDT 1% | uniswap_v3 | 0xaf48...805e | 0.3094689892 |
| SPANK / PSP 1% | uniswap_v3 | 0xbf3b...7333 | 0.01596263054 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.