| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| SUDO / WETH | uniswap_v2 | 0x1533...09e0 | 0.010086586 |
| SUDO / WETH 1% | uniswap_v3 | 0x68d0...16fc | 0.01035511276 |
| SUDO / XMON 1% | uniswap_v3 | 0x9e49...e9d3 | 0.829657566132516862647275344345 |
| SUDO / USDC 1% | uniswap_v3 | 0xdf70...a1b2 | 0.414717401357759 |
| SUDO / ETH 1% | uniswap-v4-ethereum | 0x27ef...9e0a | 0.01049175424 |
| SUDO / XMON 0.3% | uniswap_v3 | 0xd773...4a84 | 1.283522962736459009003143776345 |
| SUDO / WETH 0.3% | uniswap_v3 | 0x1ab1...a6cc | 2.9649519676298 |
| SUDO / USDC 0.3% | uniswap_v3 | 0x6e36...a81b | 1.94031375439659354770272580815 |
| SUDO / USDC 0.01% | uniswap_v3 | 0x9189...b777 | 0.829657566132516862647275344345 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.