| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| SKL / WETH 1% | uniswap_v3 | 0x12cc...7548 | 0.0115917659442638 |
| SKL / WETH 0.3% | uniswap_v3 | 0x0981...e471 | 0.0115696568624332 |
| SKL / ETH 1% | uniswap-v4-ethereum | 0xea63...a4c6 | 0.0114936066827274 |
| SKL / WETH | uniswap_v2 | 0xf232...09a6 | 0.011517661168582 |
| SKL / KABOSU | uniswap_v2 | 0x89c4...50c6 | 0.0115926222799617 |
| SKL / ABDS 1% | pancakeswap-v3-ethereum | 0x2bfa...d58e | 0.01247582948 |
| SKL / ABDS 0.3% | uniswap-v4-ethereum | 0x7545...30da | 0.02913333619 |
| SKL / APE | shibaswap | 0x1d5b...4f77 | 0.03561058599 |
| SKL / WETH | sushiswap | 0xaf8f...6a21 | 0.01523209047 |
| SKL / SHIB | shibaswap | 0x2519...72b6 | 0.01573566873 |
| SKL / WETH 1% | uniswap-v4-ethereum | 0xc207...b306 | 0.03210413723 |
| SKL / ABDS 1% | uniswap_v3 | 0xb4a0...3159 | 0.03224466324 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.