| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| AMPL / WETH | uniswap_v2 | 0xc5be...f40c | 1.23788051737044 |
| AMPL / WETH | sushiswap | 0xcb22...2962 | 1.25036077137327 |
| AMPL / USDC 0.3% | uniswap_v3 | 0xc837...26dc | 1.25150092736765 |
| USDC / AMPL 1% | uniswap-v4-ethereum | 0x392e...20ca | 1.07724300223235 |
| AMPL / USDT | carbon-defi-ethereum | 0xc537...-304 | 1.29843349565689 |
| AMPL / WETH 0.3% | uniswap_v3 | 0x86d2...b335 | 0.822708413 |
| AMPL / ETH 0.01% | uniswap-v4-ethereum | 0xcd49...b5d1 | 1.14884884006746 |
| USDC / AMPL 0.3% | uniswap-v4-ethereum | 0x80f2...2e1a | 1.0808348041 |
| USDC / AMPL | carbon-defi-ethereum | 0xc537...1918 | 1.2515770637 |
| AAVE / LINK / MKR / AMPL 10% | balancer_ethereum | 0x6b0d...43e2 | 140.9705682637 |
| TRUMP / AMPL | uniswap_v2 | 0x8114...7b1e | 1.0903901753 |
| AMPL / gKIMCHI | uniswap_v2 | 0x7755...6de1 | 1.2058189736 |
| AMPL / DAI 0.3% | uniswap_v3 | 0x61d8...f591 | 0.8423222295 |
| MICKEY / AMPL 1% | uniswap_v3 | 0x1d48...be9d | 1.1975117268 |
| SPOT / AMPL 0.3% | uniswap_v3 | 0x0212...396b | 1.2781856184 |
| AMPL / WETH 0.05% | uniswap_v3 | 0xe686...cb35 | 0.9288136273 |
| AMPL / MKR | uniswap_v2 | 0xd18b...de40 | 1.5500427682 |
| AMPL / FRAX | uniswap_v2 | 0xe28a...494f | 1.2151253117 |
| PAXG / AMPL | uniswap_v2 | 0xae2a...fd4d | 1.1350574041 |
| AMPL / USDT 1% | uniswap_v3 | 0x42e4...2a23 | 0.9809718334 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.