| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| EUL / ETH 1% | uniswap-v4-ethereum | 0x8397...6baa | 1.4211783607 |
| EUL / ETH 0.3% | ekubo-v3-ethereum | 0x0000...b977 | 1.430054661 |
| USDC / EUL 0.3% | ekubo-v3-ethereum | 0x0000...1306 | 1.43120257948817 |
| USDC / EUL 0.01% | uniswap-v4-ethereum | 0xb976...78b4 | 1.42566538055545 |
| EUL / WETH 1% | uniswap_v3 | 0xb003...9fb4 | 1.4030154719 |
| EUL / WETH | uniswap_v2 | 0xe96c...2fa1 | 1.4022580683 |
| EUL / WETH 0.3% | balancer_ethereum | 0x8fe0...13f4 | 1.4057276933 |
| EUL / ETH | uniswap-v4-ethereum | 0x9eed...36bc | 1.503659232 |
| EUL / USDT 0.3% | uniswap-v4-ethereum | 0x5e57...fc8f | 6.64218289 |
| EUL / ETH 1% | uniswap-v4-ethereum | 0x592f...b3d3 | 10.3627297309 |
| USDC / EUL 1% | uniswap-v4-ethereum | 0x4bca...f692 | 11.9846692368 |
| EUL / ETH 0.5% | ekubo-v3-ethereum | 0x0000...64e1 | 1.5954200807 |
| EUL / ETH 0.3% | uniswap-v4-ethereum | 0xc675...44c2 | 9.0671371201 |
| USDC / EUL 88% | uniswap-v4-ethereum | 0x1c42...4549 | 0.7642302365 |
| EUL / USDT 80% | uniswap-v4-ethereum | 0x144f...0b52 | 0.781348755 |
| EUL / USDC 1% | uniswap_v3 | 0x175c...3f34 | 3.0632403240829061287 |
| EUL / WBTC 0.3% | uniswap-v4-ethereum | 0x9f69...9d92 | 1.2203423131 |
| EUL / USDT 1% | uniswap_v3 | 0x6e12...52be | 5.4001665784 |
| EUL / USDT 0.3% | uniswap_v3 | 0x80fc...41e9 | 12.4428567457 |
| DC / EUL 1% | uniswap_v3 | 0x917f...38a7 | 2.8370609432197544615898357684 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.