| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| SGi / USDC 20% | uniswap-v4-ethereum | 0xb0c6...65b1 | 0.1649772477 |
| SGi / ETH 85% | uniswap-v4-ethereum | 0x38f7...565b | 1.1908339268 |
| SGi / USDT 0.3% | uniswap-v4-ethereum | 0x66e8...c4f9 | 0.9005648225 |
| SGi / WETH 1% | uniswap_v3 | 0x0391...f0f4 | 0.1111704696 |
| SGi / USDT 35% | uniswap-v4-ethereum | 0xf419...a301 | 0.1977041469 |
| SGi / USDT 19% | uniswap-v4-ethereum | 0xe8ed...25b5 | 0.7791678744 |
| SGi / USDC 71.5% | uniswap-v4-ethereum | 0x3eea...cbfb | 0.3316241125 |
| SGi / ETH 0.01% | uniswap-v4-ethereum | 0xad82...e0ee | 0.06015653875 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.