| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| WAMPL / WETH 1% | uniswap_v3 | 0x0c2b...0f11 | 1.64464701649756 |
| EEFI / WAMPL 1% | uniswap_v3 | 0x6f40...6663 | 1.65518249263617 |
| WAMPL / WBTC / WETH 0.3% | balancer_ethereum | 0xd4e2...6f4d | 1.6809215676298 |
| WAMPL / WETH | uniswap_v2 | 0xdaec...9017 | 1.72688091403382 |
| stAMPL / WAMPL 1% | uniswap-v4-ethereum | 0xf929...2dce | 3.9558541523 |
| SPOT / WAMPL 1% | uniswap-v4-ethereum | 0x9be6...112e | 3.3866459396 |
| WAMPL / WETH 0.3% | uniswap_v3 | 0x1eec...be01 | 4.174523049 |
| WAMPL / AMPL | uniswap_v2 | 0xa5e7...772b | 3.8325762894 |
| WAMPL / WETH 0.3% | balancer_ethereum | 0xed5d...ffaa | 1.5641664176 |
| SPOT / WAMPL 1% | uniswap_v3 | 0x497a...c2a1 | 1.8588982068 |
| AMPL / WAMPL 1% | uniswap_v3 | 0x0530...55e0 | 17.0413338937 |
| gOHM / WAMPL 1% | uniswap_v3 | 0x9892...9692 | 3.5877656042 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.