| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| SHPING / WETH | sushiswap | 0xd920...ac6e | 0.00154376220093051 |
| XYO / SHPING 0.3% | uniswap_v3 | 0xc908...0197 | 0.00148441342394291 |
| SHPING / USDT 20% | uniswap-v4-ethereum | 0x651a...9a62 | 0.001579670859 |
| EUROC / SHPING 1% | uniswap-v4-ethereum | 0xa444...aa49 | 0.00155737351347749 |
| TRX / SHPING 0.3% | uniswap-v4-ethereum | 0xd48e...fef9 | 0.00150793269533634 |
| SHPING / LUNA 1% | uniswap_v3 | 0xdf75...d8d3 | 0.00705680206010105636342584122648 |
| SHPING / WETH 1% | uniswap_v3 | 0x9396...6bfd | 0.006948994281 |
| SHPING / USDC 1% | uniswap_v3 | 0xdd4f...ba30 | 0.00695130731822943996002387792498 |
| JASMY / SHPING 1% | uniswap_v3 | 0xb921...2f73 | 0.006684832997 |
| SHPING / WETH | uniswap_v2 | 0x9ce6...6026 | 0.002921062372 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.