| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ETHFI / WETH 0.3% | uniswap_v3 | 0x06f0...8189 | 0.818684664514457 |
| ETHFI / ETH 1% | uniswap-v4-ethereum | 0x526c...bdaa | 0.802153942071172 |
| ETHFI / USDT 0.3% | uniswap_v3 | 0x80fa...6644 | 0.815756601832567 |
| ETHFI / USDC 1% | uniswap_v3 | 0x4d39...1e66 | 0.806232424135394 |
| KABOSU / ETHFI | uniswap_v2 | 0xcd79...ea2a | 0.797717180481144 |
| ETHFI / WETH | uniswap_v2 | 0xbcf7...bef6 | 0.801736224418783 |
| RZR / ETHFI 1% | uniswap-v4-ethereum | 0x5817...22fa | 0.801615025201511 |
| ETHFI / WETH 1% | uniswap_v3 | 0xdefd...3e1c | 0.805270557048156 |
| sETHFI / ETHFI 1.25% | uniswap-v4-ethereum | 0x5134...5b43 | 0.8394775806 |
| RZR / ETHFI 2% | balancer-v3-ethereum | 0x8115...24fa | 0.837866339617903 |
| sETHFI / ETHFI 24% | uniswap-v4-ethereum | 0x32b3...7ea9 | 0.8548550977 |
| sETHFI / ETHFI 25% | uniswap-v4-ethereum | 0x10ea...72ee | 0.833623676255811 |
| sETHFI / ETHFI 7.5% | uniswap-v4-ethereum | 0x0741...ec50 | 1.2298703382 |
| ETHFI / ETH 0.3% | uniswap-v4-ethereum | 0x7b99...0615 | 1.0074034261 |
| ETHFI / weETH | curve | 0xcccd...2a7e | 0.7796895198 |
| EIGEN / ETHFI 1% | uniswap-v4-ethereum | 0x924c...7b88 | 1.1153383312 |
| kpEF-4 / ETHFI 1% | uniswap_v3 | 0x880f...93ca | 1.0912521838 |
| kpEF-5 / ETHFI 1% | uniswap_v3 | 0x7a3d...1f3f | 1.1807547484 |
| ETHFI / ETH 0.01% | uniswap-v4-ethereum | 0x16ef...23a0 | 0.6121550474 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.