| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| SHI / TREAT | shibaswap | 0x5b02...6ede | 0.00000748344209906926 |
| SHI / TREAT 1% | uniswap_v3 | 0xa54d...da09 | 0.00000858145769653215 |
| SHI / BONE | shibaswap | 0xe6f6...1f2a | 0.00000801607337944589 |
| SHI / TREAT | uniswap_v2 | 0xdbf3...770d | 0.00000870505921690538 |
| SHI / Shy | shibaswap | 0xb0a1...8ee9 | 0.0000076607590217736 |
| SHI / TREAT 1% | uniswap_v3 | 0x4828...eaf2 | 0.000026416889456976 |
| HACHI / SHI 1% | uniswap-v4-ethereum | 0xb947...3e25 | 0.00000830223569143547 |
| SHI / TREAT 1% | uniswap-v4-ethereum | 0x2d31...43d2 | 0.3413377746 |
| DOGS / SHI 1% | uniswap-v4-ethereum | 0x78cb...37c2 | 0.000008796205185 |
| SHI / USDC | shibaswap | 0xa58a...ebb4 | 0.000005993939305 |
| SHI / KŪKA 1% | uniswap-v4-ethereum | 0x6c4c...ee2b | 0.00003753287306 |
| SHI / USDC | uniswap_v2 | 0xbbf9...ce34 | 0.000006617210778 |
| SHI / WETH | shibaswap | 0xcc85...0bd9 | 0.000000000000001013505761 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.