| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| YGG / WETH | sushiswap | 0x99b4...a343 | 0.0718548470931944 |
| REVV / YGG | sushiswap | 0xd374...1d67 | 0.071599103295996 |
| YGG / KABOSU | uniswap_v2 | 0xacaf...fb68 | 0.0705304928705144 |
| BPT / AUDIO / YGG / SAND / NFTX / MUSE / AXS / WETH 1% | balancer_ethereum | 0x344e...0df2 | 0.373092669390480115685175264236 |
| YGG / USDC 1% | uniswap_v3 | 0x7ec0...7ea0 | 1.0283960795 |
| YGG / USDT 88% | uniswap-v4-ethereum | 0x2ee7...8a05 | 0.009996597539 |
| YGG / USDT 0.3% | uniswap-v4-ethereum | 0x70b5...9631 | 0.127927570430957 |
| YGG / USDC | sushiswap | 0xb9c3...5541 | 0.1315250207 |
| YGG / SUSHI | sushiswap | 0xc1bc...baee | 0.3241868303 |
| YGG / WETH | uniswap_v2 | 0x2cfa...b206 | 0.111989313750107 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.