| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| USDC / SPYon 1% | uniswap_v3 | 0xd192...826b | 668.257483115558 |
| SPYon / USDC 0.3% | uniswap_v3 | 0x5638...7eeb | 657.2424751429 |
| TrumpBucks / SPYon 1% | uniswap-v4-ethereum | 0xeab6...9da8 | 664.367161654488 |
| TQQQon / SPYon 0.3% | balancer-v3-ethereum | 0x33c0...6034 | 675.5565967829 |
| QQQon / SPYon 0.3% | uniswap-v4-ethereum | 0x6608...fdce | 672.11773375 |
| USDC / SPYon 0.03% | balancer-v3-ethereum | 0x0617...3d4f | 692.40182751 |
| USDC / SPYon 28% | uniswap-v4-ethereum | 0x22e2...a368 | 635.248935113094 |
| USDC / SPYon 29% | uniswap-v4-ethereum | 0x4c8c...9e1c | 1127.126564622 |
| SPYon / ETH 48% | uniswap-v4-ethereum | 0x013e...0855 | 1144.9502207606 |
| QQQon / PAXG / waEthUSDC / SPYon 0.3% | balancer-v3-ethereum | 0xf3dc...46b3 | 637.4376627418 |
| USDC / SPYon 87% | uniswap-v4-ethereum | 0x7125...4a97 | 5345.2014225881 |
| USDC / SPYon 0.3% | uniswap-v4-ethereum | 0xdf21...92ce | 686.5466981528 |
| SPYon / ETH 1% | uniswap-v4-ethereum | 0x7108...0ae6 | 707.5074331565 |
| USDT / SPYon 88% | uniswap-v4-ethereum | 0x3e84...9ef5 | 6120.111881449 |
| USDC / SPYon 1% | uniswap-v4-ethereum | 0xb98b...0011 | 686.9104289812 |
| SPYon / QQQon | curve | 0x40c5...75c3 | 689.1632324789 |
| USDon / SPYon 0.3% | uniswap-v4-ethereum | 0x671e...0f7d | 678.3934850349 |
| PAXG / rETH / SPYon | curve | 0xaa69...b041 | 4655.2066601872 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.