| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| AMKT / WBTC 0.3% | uniswap_v3 | 0xe901...1f14 | 195.1221167876 |
| AMKT / ETH 96.5% | uniswap-v4-ethereum | 0x86b5...0ae7 | 101.032057838598 |
| USDC / AMKT 93.35% | uniswap-v4-ethereum | 0x3666...15b5 | 157.1708114851 |
| AMKT / ETH 90% | uniswap-v4-ethereum | 0x409c...29f3 | 191.8277495537 |
| USDC / AMKT 99.989% | uniswap-v4-ethereum | 0x4286...9ddb | 96.3571335309 |
| USDC / AMKT 96.2% | uniswap-v4-ethereum | 0xab50...12b8 | 90.7106466009 |
| AMKT / WETH 0.3% | uniswap_v3 | 0xbda5...3ec2 | 146.905062302923 |
| USDC / AMKT 96% | uniswap-v4-ethereum | 0x7942...eb49 | 159.6535416059 |
| AMKT / USDC 0.3% | uniswap_v3 | 0xf0b9...7a0a | 62.3851720543651 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.