| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| SNT / WETH 0.3% | uniswap_v3 | 0x084b...928f | 0.0159088865855912 |
| SNT / WETH | uniswap_v2 | 0x59e7...cea2 | 0.0159004986252999 |
| DNT / WBTC / VEE / KEY / SNT / QSP / WETH 5% | balancer_ethereum | 0x382d...9ac8 | 0.0122811356591267 |
| DNT / WBTC / KEY / SNT / USDC / WETH 5% | balancer_ethereum | 0x40fb...34f7 | 0.02235727544 |
| SNT / WETH 0.3% | balancer_ethereum | 0x8c5f...f5dd | 0.01375852803 |
| SNT / ETH 0.3% | uniswap-v4-ethereum | 0x5b6c...99b3 | 0.02016111516 |
| SNT / DAI | uniswap_v2 | 0x4367...168e | 0.0234885685543134 |
| SNT / KABOSU | uniswap_v2 | 0x20d0...c34e | 0.02773739834 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.