| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| SAND / WETH | uniswap_v2 | 0x3dd4...bd74 | 0.139979636734937 |
| SUPER / SAND | uniswap_v2 | 0x30e7...03e6 | 0.139185340381698 |
| SAND / USDT 0.3% | uniswap-v4-ethereum | 0x7ece...9375 | 0.13968926848719 |
| SAND / WETH 0.3% | uniswap_v3 | 0x5859...e7b7 | 0.139644751244608 |
| REVV / SAND | uniswap_v2 | 0x5d95...97a7 | 0.139185340381698 |
| SAND / WETH 1% | uniswap_v3 | 0x5b97...4939 | 0.139145357117705 |
| SOTU / SAND | uniswap_v2 | 0x2a7f...e409 | 0.140271877274234 |
| SAND / USDT | smardex-ethereum | 0x757d...6091 | 0.142288929789421 |
| LMT / SAND | uniswap_v2 | 0xf648...6eb6 | 0.141001344142325 |
| SAND / WETH | shibaswap | 0x84fd...d577 | 0.145076424407878 |
| SAND / USDC 1% | uniswap_v3 | 0x5864...514e | 0.148244263800836 |
| SAND / MATIC | uniswap_v2 | 0x5b50...472b | 0.148745819999275 |
| SAND / ETH 0.5% | uniswap-v4-ethereum | 0x2991...c598 | 0.3139277142 |
| MANA / SAND / APE / ENJ 0.5% | balancer_ethereum | 0x0c3a...6b09 | 0.2846362968 |
| SAND / WETH 0.05% | uniswap_v3 | 0xb3fe...af97 | 4.41202474765236 |
| BPT / AUDIO / YGG / SAND / NFTX / MUSE / AXS / WETH 1% | balancer_ethereum | 0x344e...0df2 | 0.373092669390480115685175264236 |
| SAND / ETH 0.3% | uniswap-v4-ethereum | 0x119e...ec28 | 0.4395892194 |
| uZODIAC / SAND | unicly | 0x1b19...7617 | 0.1634514675 |
| SAND / USDT | apeswap_ethereum | 0x3d6d...8234 | 0.155806776103669 |
| SAND / UNI | uniswap_v2 | 0xb885...c5b1 | 0.1331063407 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.