| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| liquidETH / ETH 99.981% | uniswap-v4-ethereum | 0x86a8...7698 | 2220.9216883599 |
| liquidETH / ETH 0.45% | uniswap-v4-ethereum | 0x453a...5616 | 2194.9875571339 |
| liquidETH / WETH 1% | uniswap_v3 | 0x0e22...e67d | 2013.0525228876 |
| liquidETH / ETH 99.98% | uniswap-v4-ethereum | 0xe447...1647 | 2188.2119990287 |
| liquidETH / ETH 0.405% | uniswap-v4-ethereum | 0x8737...a3aa | 2279.2523638888 |
| liquidETH / ETH 1% | uniswap-v4-ethereum | 0xfb0f...564b | 4507.3887342822 |
| liquidETH / ETH 99.97% | uniswap-v4-ethereum | 0x63fd...0ddf | 2094.0652690765 |
| liquidETH / ETH 99.961% | uniswap-v4-ethereum | 0x0da8...e6fb | 2012.5795057452 |
| liquidETH / ETH 99.955% | uniswap-v4-ethereum | 0x7fd3...949e | 2243.621833488 |
| liquidETH / ETH 0.5% | uniswap-v4-ethereum | 0x7031...f831 | 3224.7651802005 |
| liquidETH / ETH 0.4% | uniswap-v4-ethereum | 0x6901...f160 | 3156.6539987183 |
| liquidETH / ETH 0.41% | uniswap-v4-ethereum | 0x3eaa...63d4 | 3161.1060388561 |
| liquidETH / ETH 0.39% | uniswap-v4-ethereum | 0x0a49...37f3 | 4901.5039263804 |
| liquidETH / ETH 0.324% | uniswap-v4-ethereum | 0x8d83...9864 | 3177.6305356778 |
| liquidETH / ETH 0.303% | uniswap-v4-ethereum | 0xcd20...a7c5 | 2452.2881185504 |
| liquidETH / ETH 0.282% | uniswap-v4-ethereum | 0xafe9...145c | 3177.6175688612 |
| liquidETH / ETH 99.961% | uniswap-v4-ethereum | 0x97e3...9ac6 | 2029.8739600999 |
| liquidETH / ETH 99.96% | uniswap-v4-ethereum | 0x96f6...40ae | 2093.5606506067 |
| liquidETH / ETH 1% | uniswap-v4-ethereum | 0xe86f...63ac | 2160.9758909757 |
| USDC / liquidETH 75% | uniswap-v4-ethereum | 0x35e1...3ab8 | 4640.3201948725 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.