| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| STATE / WETH | uniswap_v2 | 0xd34d...ec0d | 0.0000000009557865694 |
| STATE / RSTATE | radioshack_ethereum | 0xad9f...c48f | 0.0000000009547291667 |
| STATE / WETH | sushiswap | 0x1da9...6e62 | 0.0000000009587634817 |
| STATE / WETH | shibaswap | 0x85cb...473d | 0.0000000009549247559 |
| STATE / BEARDY 1% | uniswap_v3 | 0x4f59...b1ed | 0.0000000009401378544 |
| STATE / BUILD | radioshack_ethereum | 0xa016...2746 | 0.0000000009534488738 |
| STATE / USDT | uniswap_v2 | 0xa0c7...ae23 | 0.000000001001550834 |
| STATE / USDC | sushiswap | 0x6403...42e7 | 0.000000001011686272 |
| STATE / VR | uniswap_v2 | 0x3ac7...b266 | 0.000000001027242502 |
| STATE / USDC | uniswap_v2 | 0xd1fc...4bed | 0.000000001105138661 |
| STATE / QANX | uniswap_v2 | 0x20f4...b94c | 0.000000001094875786 |
| STATE / WETH 1% | kyberswap_elastic | 0x7872...4fc9 | 0.0000000154974919979412552890375451408 |
| STATE / WETH 1% | uniswap_v3 | 0x6958...d0d1 | 0.000000002491107642 |
| STATE / WETH 0.3% | balancer_ethereum | 0x3cc9...cea2 | 0.000000001364861832 |
| STATE / Gold 1 | uniswap_v2 | 0x6d39...c2a3 | 0.000000001155766074 |
| STATE / SHIB | uniswap_v2 | 0x618a...39a5 | 0.0000000009743749591 |
| STATE / PAXG | uniswap_v2 | 0x341c...961f | 0.00000000115682416 |
| STATE / BONE | uniswap_v2 | 0x31f4...bd15 | 0.000000001146913915 |
| STATE / ETH 1% | uniswap-v4-ethereum | 0x2246...8dca | 0.000000001785386993 |
| STATE / WBTC | curve | 0xecb1...d91c | 0.0000000008506196164 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.