| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| SD / ETH 1.69% | uniswap-v4-ethereum | 0xc3a5...8fc5 | 0.1988204863 |
| SD / USDC 0.3% | uniswap_v3 | 0xc72a...a29e | 0.1959239643 |
| SD / USDT 3.57% | uniswap-v4-ethereum | 0xf5b0...7a65 | 0.1938241917 |
| SD / USDC | uniswap_v2 | 0x4177...8218 | 0.1954507649 |
| SD / USDT 2.89% | uniswap-v4-ethereum | 0xd0b3...70ba | 0.1932517683 |
| SD / USDT 3% | uniswap-v4-ethereum | 0x2005...8a9b | 0.2049927499 |
| SD / WETH 0.5% | balancer_ethereum | 0xe401...1687 | 0.2035401823 |
| SD / ETHx 0.3% | balancer_ethereum | 0x034e...76ea | 0.1974988212 |
| SD / USDC 2.818% | uniswap-v4-ethereum | 0x4c1f...50b1 | 0.2183469023 |
| SD / WETH | dodo-pmm-ethereum | 0x2734...3f22 | 0.204001512 |
| SD / USDT 3.6% | uniswap-v4-ethereum | 0x60b9...8fef | 0.1887184227 |
| SD / USDC 0.3% | balancer_ethereum | 0x4227...0b23 | 0.2197172477 |
| SD / USDT 1.1% | uniswap-v4-ethereum | 0xbb59...8c00 | 0.2014229876 |
| SD / USDC 0.3% | balancer_ethereum | 0xdb0c...e9f0 | 0.256775223 |
| SD / USDT 5% | uniswap-v4-ethereum | 0x1224...f92c | 0.2512708377 |
| SD / USDT 3% | uniswap-v4-ethereum | 0x7e5e...1772 | 0.1345981116 |
| SD / USDT 3.111% | uniswap-v4-ethereum | 0xa0e6...e4ff | 0.2193911198 |
| SD / USDT 3.556% | uniswap-v4-ethereum | 0x3d1a...3e8d | 0.261082562 |
| SD / USDC 2.989% | uniswap-v4-ethereum | 0x19e9...9f4a | 0.2228781156 |
| SD / USDT 2.85% | uniswap-v4-ethereum | 0xa923...051b | 0.1341165406 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.