| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| SHRAP / WETH 1% | uniswap_v3 | 0x0a67...60e1 | 0.000717809246640452 |
| SHRAP / USDC | traderjoe-v2-1-ethereum | 0xf997...ad93 | 0.199576996124551 |
| SHRAP / WETH 0.3% | uniswap_v3 | 0x7df3...ae2d | 0.1414549595 |
| SHRAP / USDC 90% | uniswap-v4-ethereum | 0xd018...bcea | 0.001525246552 |
| SHRAP / USDC 99.1% | uniswap-v4-ethereum | 0x53a6...40f7 | 0.0008036503478 |
| SHRAP / USDC 70.4% | uniswap-v4-ethereum | 0x8a65...0195 | 0.000618519926254706 |
| SHRAP / USDC 99.988% | uniswap-v4-ethereum | 0x2064...27ea | 0.0007059024221 |
| SHRAP / USDC 88% | uniswap-v4-ethereum | 0xfd77...5b34 | 0.0005174450836 |
| SHRAP / USDT 1% | uniswap_v3 | 0xc57f...7d18 | 0.0869418293 |
| SHRAP / USDC 0.3% | uniswap_v3 | 0xaaa2...ae70 | 0.301371243115041 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.