| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| BLEND / USDC 0.3% | uniswap_v3 | 0x8ece...c85b | 0.1215361582 |
| BLEND / USDT 5% | uniswap-v4-ethereum | 0x17c3...8881 | 0.1197572638 |
| BLEND / USDC 2% | uniswap-v4-ethereum | 0x2c76...bba1 | 0.1543201187 |
| BLEND / USDC 1.889% | uniswap-v4-ethereum | 0x7c40...8402 | 0.1337835141 |
| BLEND / USDC 4% | uniswap-v4-ethereum | 0x7cd2...5de1 | 0.1127580592 |
| BLEND / USDT 1% | uniswap-v4-ethereum | 0x59bc...f86a | 0.1426992204 |
| BLEND / USDT 3% | uniswap-v4-ethereum | 0x51eb...be6e | 0.151486622 |
| BLEND / USDC 1.388% | uniswap-v4-ethereum | 0x0cbd...10bd | 0.1087470973 |
| BLEND / USDC 0.946% | uniswap-v4-ethereum | 0x2f49...add0 | 0.1045165067 |
| BLEND / ETH 1% | uniswap-v4-ethereum | 0xea79...2f6f | 0.1461463489 |
| BLEND / USDC 1.33% | uniswap-v4-ethereum | 0xa417...4cac | 0.1329099355 |
| BLEND / USDC 1.388% | uniswap-v4-ethereum | 0x176e...f655 | 0.130649337 |
| BLEND / USDC 1.55% | uniswap-v4-ethereum | 0xf659...a995 | 0.1453711043 |
| BLEND / USDC 0.933% | uniswap-v4-ethereum | 0xa65c...edcb | 0.1022697076 |
| BLEND / USDC 1.5% | uniswap-v4-ethereum | 0x94c7...90df | 0.1383682327 |
| BLEND / USDT 1.3% | uniswap-v4-ethereum | 0x7596...3036 | 0.1426315364 |
| BLEND / ETH 5% | uniswap-v4-ethereum | 0x4010...c18d | 0.1232692632 |
| BLEND / USDC 2% | uniswap-v4-ethereum | 0x24d6...f3f9 | 0.1344259081 |
| BLEND / USDT 2.5% | uniswap-v4-ethereum | 0xda52...5972 | 0.1383513218 |
| BLEND / USDC 3% | uniswap-v4-ethereum | 0x4837...1c4f | 0.1621153859 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.