| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| SWAP / WETH | uniswap_v2 | 0xd90a...e1f8 | 0.0383546819095149 |
| SWAP / USDT 1% | uniswap-v4-ethereum | 0x6d96...abb1 | 0.0400778588041979 |
| SWAP / WETH 1% | uniswap_v3 | 0x76d8...189c | 0.0409270202146836 |
| WPLS / SWAP 1% | uniswap-v4-ethereum | 0x30cf...fc9b | 0.06548558833 |
| SWAP / USDC 1% | uniswap_v3 | 0x47e4...14e1 | 0.1359308352 |
| SWAP / WETH 0.3% | uniswap_v3 | 0xf590...84d0 | 0.2207151407 |
| SWAP / USDT 88% | uniswap-v4-ethereum | 0xa742...1529 | 0.0108048074 |
| SWAP / WETH 0.15% | balancer_ethereum | 0x6602...9c3f | 0.05593394714 |
| SWAP / USDT 1% | uniswap_v3 | 0xb45a...3e18 | 0.05024978977 |
| SWAP / DAI | uniswap_v2 | 0x12f7...7340 | 20.2100362441386 |
| WPLS / SWAP 1% | uniswap_v3 | 0x2cc7...cc87 | 0.1017539843 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.