| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| wPE / M2 | uniswap_v2 | 0x9816...8ab7 | 49.5211769133566 |
| wPE / WETH | uniswap_v2 | 0x75f8...faf9 | 49.8963275983947 |
| wPE / WBTC | uniswap_v2 | 0x0731...ef24 | 49.1977829633276 |
| BHNY / wPE | uniswap_v2 | 0x9ec9...e0b0 | 53.6200575947 |
| wPE / STR | uniswap_v2 | 0x8eaa...ace8 | 53.5180313341 |
| wPE / LIFT | uniswap_v2 | 0xecea...866e | 53.6572988103 |
| wPE / WETH 1% | balancer_ethereum | 0xe242...d970 | 53.9870682981 |
| wPE / YFU | uniswap_v2 | 0x8dc0...1a60 | 54.2307166393 |
| wPE / PIXEL | uniswap_v2 | 0x4694...ce19 | 53.7952153626 |
| wPE / WETH 0.3% | uniswap_v3 | 0x5ebd...76e4 | 2977.56744841485 |
| wPE / WETH 1% | uniswap_v3 | 0x4a80...8738 | 1800.422895615 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.