| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| SpacePi / WETH | uniswap_v2 | 0x9598...6e15 | 0.00000000001041970666 |
| SpacePi / USDC 50% | uniswap-v4-ethereum | 0x3530...ade3 | 0.00000000002065692605 |
| SpacePi / USDC 40% | uniswap-v4-ethereum | 0x5531...1eef | 0.0000000000212736935 |
| SpacePi / USDC 15% | uniswap-v4-ethereum | 0x29a9...134a | 0.00000000000513207333 |
| SpacePi / USDT 31% | uniswap-v4-ethereum | 0x5b79...d939 | 0.000000000008975580239 |
| SpacePi / ETH 10% | uniswap-v4-ethereum | 0xc56a...e351 | 0.00000000001355394626 |
| SpacePi / WETH | pancakeswap_ethereum | 0xa97d...8b04 | 0.00000000001264677967 |
| SpacePi / WETH 1% | uniswap_v3 | 0x8d95...bd1f | 0.000000001923922341 |
| SpacePi / WETH 0.3% | uniswap_v3 | 0xd4bf...145b | 0.00000000641092179285196 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.