| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| WLFI / ETH 0.99% | uniswap-v4-ethereum | 0x7f28...1be9 | 0.1032855052 |
| WLFI / WETH 0.3% | uniswap_v3 | 0xcdf9...fa07 | 0.1032787489 |
| WLFI / USDT 1% | uniswap_v3 | 0x238f...fc74 | 0.1034500612 |
| WLFI / USDT 0.3% | uniswap_v3 | 0x813b...d995 | 0.1030069416 |
| USDC / WLFI 1% | uniswap_v3 | 0x6e59...df76 | 0.103077711462143 |
| USD1 / WLFI 0.3% | uniswap_v3 | 0x4637...c73d | 0.103184540451663 |
| USDC / WLFI 0.3% | uniswap_v3 | 0x5533...5378 | 0.103279658597981 |
| PEPE / UNI / WBTC / PANDORA / PROS / waEthUSDC / WLFI 0.3% | balancer-v3-ethereum | 0xb1f6...27c6 | 0.000003483911984 |
| WLFI / WETH 1% | uniswap_v3 | 0xca2e...3838 | 0.1034672139 |
| PROS / WLFI 0.3% | uniswap-v4-ethereum | 0x016c...dcac | 0.103251212521319 |
| WLFI / ETH 0.3% | uniswap-v4-ethereum | 0xb290...1163 | 0.1034988393 |
| USDC / WLFI 0.94% | uniswap-v4-ethereum | 0x7668...484e | 0.103555709775756 |
| ZIK / WLFI 1% | uniswap-v4-ethereum | 0xc83c...1a91 | 0.105352914295423 |
| USD1 / WLFI 1% | uniswap_v3 | 0xf9f5...c85d | 0.103096469381643 |
| RSR / WLFI 0.3% | uniswap-v4-ethereum | 0xde6d...aa69 | 0.103455252943342 |
| WLFI / WETH | uniswap_v2 | 0x8424...7de7 | 0.09836821603 |
| WLFI / wstETH 4.001% | uniswap-v4-ethereum | 0x5267...b180 | 0.09584395938 |
| WLC / WLFI 0.3% | uniswap_v3 | 0x8c87...ebf2 | 0.2157387577 |
| WLFI / USDT 1% | uniswap-v4-ethereum | 0x0e53...92fa | 0.1034093288 |
| USDC / WLFI 2.5% | uniswap-v4-ethereum | 0x194d...d36f | 0.2377803633 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.