| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| SFUND / WETH | uniswap_v2 | 0x8fb8...7a59 | 0.00000117339497801641 |
| SFUND / ETH 88% | uniswap-v4-ethereum | 0xd622...1e36 | 0.000001106922531 |
| SFUND / USDT 15% | uniswap-v4-ethereum | 0xb720...c331 | 0.000001191971773 |
| SFUND / USDC 88% | uniswap-v4-ethereum | 0xe2a5...ad2f | 0.000001080326515 |
| SFUND / USDC 15% | uniswap-v4-ethereum | 0x710c...44d0 | 0.000002272877442 |
| SFUND / P33L 10% | uniswap-v4-ethereum | 0xcd52...ac33 | 0.000008631962498 |
| SFUND / WETH | pancakeswap_ethereum | 0x0233...1ff7 | 0.000001373378164 |
| P33L / SFUND 0.3% | uniswap_v3 | 0x4b22...0cfd | 0.0205227129 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.