| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| AMPL / WETH | uniswap_v2 | 0xc5be...f40c | 1.17038161173075 |
| AMPL / WETH | sushiswap | 0xcb22...2962 | 1.16255850688663 |
| AMPL / USDC 0.3% | uniswap_v3 | 0xc837...26dc | 1.18054458121822 |
| PAXG / AMPL | uniswap_v2 | 0xae2a...fd4d | 1.16326067387554 |
| USDC / AMPL 1% | uniswap-v4-ethereum | 0x392e...20ca | 1.0394140528 |
| AMPL / USDT | carbon-defi-ethereum | 0xc537...-304 | 1.3723540525 |
| AMPL / WETH 0.3% | uniswap_v3 | 0x86d2...b335 | 0.6016062989 |
| AMPL / WETH 1% | uniswap_v3 | 0x6d02...ff52 | 1.56332469720717 |
| AMPL / ETH 0.01% | uniswap-v4-ethereum | 0xcd49...b5d1 | 0.8555960581 |
| USDC / AMPL 0.3% | uniswap-v4-ethereum | 0x80f2...2e1a | 1.0502627302 |
| USDC / AMPL | carbon-defi-ethereum | 0xc537...1918 | 1.1880267528 |
| AMPL / USDT 0.05% | uniswap_v3 | 0x04a9...d26d | 1.161339151923824560546821947584 |
| AAVE / LINK / MKR / AMPL 10% | balancer_ethereum | 0x6b0d...43e2 | 122.8186506135 |
| AMPL / ETH 0.3% | uniswap-v4-ethereum | 0x38bc...4300 | 0.9746863286 |
| AMPL / DAI 0.05% | uniswap_v3 | 0x9db3...7670 | 0.85961280701988 |
| AMPL / USDT 0.3% | uniswap_v3 | 0x0bed...acbb | 0.864000393122918 |
| AMPL / gKIMCHI | uniswap_v2 | 0x7755...6de1 | 1.2058189736 |
| AMPL / DAI 0.3% | uniswap_v3 | 0x61d8...f591 | 0.8423222295 |
| CVL / AMPL | uniswap_v2 | 0x9c1c...a35c | 1.2229593638 |
| MICKEY / AMPL 1% | uniswap_v3 | 0x1d48...be9d | 1.1975117268 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.