| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| AMPL / WETH | uniswap_v2 | 0xc5be...f40c | 1.2961862959 |
| AMPL / WETH | sushiswap | 0xcb22...2962 | 1.2861939678 |
| AMPL / USDC 0.3% | uniswap_v3 | 0xc837...26dc | 1.2768285159 |
| AMPL / WETH | carbon-defi-ethereum | 0xc537...-267 | 1.0114542363 |
| USDC / AMPL 1% | uniswap-v4-ethereum | 0x392e...20ca | 1.0373698052 |
| AMPL / USDT | carbon-defi-ethereum | 0xc537...-304 | 1.2568450404 |
| AMPL / WETH 0.3% | uniswap_v3 | 0x86d2...b335 | 0.6016062989 |
| AMPL / WETH 1% | uniswap_v3 | 0x6d02...ff52 | 1.56332469720717 |
| AMPL / ETH 0.01% | uniswap-v4-ethereum | 0xcd49...b5d1 | 1.0223086821 |
| USDC / AMPL 0.3% | uniswap-v4-ethereum | 0x80f2...2e1a | 1.0502627302 |
| USDC / AMPL | carbon-defi-ethereum | 0xc537...1918 | 1.1880267528 |
| AMPL / USDT 0.05% | uniswap_v3 | 0x04a9...d26d | 1.161339151923824560546821947584 |
| AAVE / LINK / MKR / AMPL 10% | balancer_ethereum | 0x6b0d...43e2 | 207.7967303403 |
| AMPL / ETH 0.3% | uniswap-v4-ethereum | 0x38bc...4300 | 0.9746863286 |
| AMPL / DAI 0.05% | uniswap_v3 | 0x9db3...7670 | 0.85961280701988 |
| AMPL / USDT 0.3% | uniswap_v3 | 0x0bed...acbb | 0.864000393122918 |
| AMPL / gKIMCHI | uniswap_v2 | 0x7755...6de1 | 1.2058189736 |
| AMPL / DAI 0.3% | uniswap_v3 | 0x61d8...f591 | 0.8423222295 |
| PAXG / AMPL | uniswap_v2 | 0xae2a...fd4d | 1.1632606739 |
| AMPL / MKR | uniswap_v2 | 0xd18b...de40 | 1.2719361041 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.