| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| L / USD1 0.01% | uniswap-v4-ethereum | 0x5c55...6d58 | 0.000000127339234955238 |
| L / ETH 1% | uniswap-v4-ethereum | 0x5f60...8e69 | 0.000000131739584185734 |
| L / WETH 0.3% | uniswap_v3 | 0x5208...b414 | 0.00000233904856 |
| L / ETH 0.3% | uniswap-v4-ethereum | 0x6dd5...58a6 | 0.000002026330775 |
| L / WETH 0.05% | uniswap_v3 | 0x882d...f061 | 0.000001982630776 |
| USD1 / L 0.3% | uniswap_v3 | 0x50d9...4f67 | 0.000001741854076 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.