| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| H / ETH 30% | uniswap-v4-ethereum | 0x7aec...5531 | 0.10656574312194 |
| H / ETH 90% | uniswap-v4-ethereum | 0xf6f2...7b59 | 0.4502954826 |
| USDC / H 13% | uniswap-v4-ethereum | 0x7314...21a1 | 0.1143892457 |
| H / ETH 79% | uniswap-v4-ethereum | 0xb71c...6840 | 0.05698189954 |
| H / ETH 50% | uniswap-v4-ethereum | 0xe656...56b0 | 0.211257743 |
| H / ETH 80% | uniswap-v4-ethereum | 0x6cea...32bd | 0.01045822538 |
| H / ETH 10% | uniswap-v4-ethereum | 0x5bfe...7c1a | 0.06467897168 |
| USDC / H 15.73% | uniswap-v4-ethereum | 0x798b...79d3 | 0.2480663703 |
| USDC / H 11% | uniswap-v4-ethereum | 0x33d0...7600 | 0.1337164391 |
| H / USDT 6% | uniswap-v4-ethereum | 0xabcd...612e | 0.03838568294 |
| USDC / H 16.04% | uniswap-v4-ethereum | 0xe5d4...4a34 | 0.1418173614 |
| USDC / H 14.99% | uniswap-v4-ethereum | 0x6dec...874d | 0.1095081649 |
| H / ETH 3% | uniswap-v4-ethereum | 0xed75...4f3e | 0.09539916557 |
| USDC / H 15% | uniswap-v4-ethereum | 0xfd77...0106 | 0.1055172234 |
| H / USDT 3% | uniswap-v4-ethereum | 0x46a7...2322 | 0.05940341012 |
| USDC / H 10% | uniswap-v4-ethereum | 0x8c3a...250a | 0.1897003357 |
| USDC / H 9.98% | uniswap-v4-ethereum | 0x253d...36a2 | 0.1744574424 |
| USDC / H 9.5% | uniswap-v4-ethereum | 0xe185...9fbb | 0.083570162 |
| USDC / H 8.9% | uniswap-v4-ethereum | 0x6c7a...549e | 0.1522064543 |
| USDC / H 15.4% | uniswap-v4-ethereum | 0x07f3...94cf | 0.2125177832 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.