| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| sato / USDT 1% | uniswap-v4-ethereum | 0x3d66...bf5e | 0.5358999668 |
| sato / ETH 1% | uniswap-v4-ethereum | 0x341b...a778 | 0.5342409059 |
| sato / USDC 3.1% | uniswap-v4-ethereum | 0x92ee...b0db | 0.5354277968 |
| sato / USDC 0.991% | uniswap-v4-ethereum | 0x30f6...24ad | 0.5323412501 |
| sato / ETH 3% | uniswap-v4-ethereum | 0xde68...ee1c | 0.5189334417 |
| sato / ETH 1.2% | uniswap-v4-ethereum | 0x4481...cb16 | 0.5277624294 |
| sato / ETH 10% | uniswap-v4-ethereum | 0x3283...8329 | 0.4936220962 |
| sato / USDC 0.99% | uniswap-v4-ethereum | 0x0f18...a15f | 0.4561212867 |
| sato / USDC 2.998% | uniswap-v4-ethereum | 0x564f...6247 | 0.5463654305 |
| sato / WETH 0.3% | uniswap_v3 | 0xea86...46de | 0.5320166528 |
| sato / USDC 0.98% | uniswap-v4-ethereum | 0xe45c...5928 | 0.559820459 |
| sato / USDT 1% | uniswap_v3 | 0x666f...abe9 | 0.5363537743 |
| sato / USDC 0.981% | uniswap-v4-ethereum | 0x6f64...3374 | 0.5373127288 |
| sato / ETH 5% | uniswap-v4-ethereum | 0x5b14...cfb0 | 0.5185550153 |
| sato / ETH 3.1% | uniswap-v4-ethereum | 0xff75...9799 | 0.2565559904 |
| sato / ETH 9.9% | uniswap-v4-ethereum | 0xe66b...1c14 | 0.4916636361 |
| sato / USDC 1% | uniswap-v4-ethereum | 0x3ea5...852d | 0.4857471161 |
| sato / USDC 0.98% | uniswap-v4-ethereum | 0x8b66...c712 | 0.5870961691 |
| sato / USDC 3.099% | uniswap-v4-ethereum | 0x6ee0...2c67 | 0.451126134 |
| sato / USDC 0.984% | uniswap-v4-ethereum | 0xa823...4fb4 | 0.4811055062 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.