Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
SD / USDC 0.3% | uniswap_v3 | 0xc72a...a29e | 0.695694359304706 |
SD / ETH 1.69% | uniswap-v4-ethereum | 0xc3a5...8fc5 | 0.695287656269958 |
SD / USDC | uniswap_v2 | 0x4177...8218 | 0.696052228643116 |
SD / WETH 0.5% | balancer_ethereum | 0xe401...1687 | 0.706328639577592 |
SD / ETHx 0.3% | balancer_ethereum | 0x034e...76ea | 0.703109178994916 |
SD / USDC 0.3% | balancer_ethereum | 0x4227...0b23 | 0.757874087979978 |
SD / USDC 0.3% | balancer_ethereum | 0xdb0c...e9f0 | 1.0063991586 |
SD / USDC | sushiswap | 0x674f...be6a | 0.9356273836 |
SD / USDC 1% | uniswap_v3 | 0xc4e7...565e | 0.8530388971 |
SD / WETH 1% | uniswap_v3 | 0x794f...11e7 | 0.000000000001061075813454405621861564415 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.