| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| SPC / WETH | curve | 0x6dc8...e2d0 | 0.0173061480428554 |
| SPC / USDC 0.3% | sushiswap-v3-ethereum | 0x54a5...3f5c | 0.0173289776774973 |
| SPC / USDC 0.3% | uniswap_v3 | 0xf903...3578 | 0.017329691137331 |
| SPC / WETH 0.3% | sushiswap-v3-ethereum | 0xe21a...6d55 | 0.0173701926994042 |
| SPC / WETH | uniswap_v2 | 0x3f75...f105 | 0.0174004807601254 |
| SPC / USDC 0.3% | uniswap-v4-ethereum | 0xf0fb...1204 | 0.02338587665 |
| VUSD / SPC 0.3% | uniswap-v4-ethereum | 0x4b88...26fe | 0.03300864759 |
| SPC / ETH 0.3% | uniswap-v4-ethereum | 0xbccf...1ec7 | 0.03181883145 |
| SPC / WETH 1% | uniswap_v3 | 0x209a...9f47 | 0.017738506 |
| SPC / WETH 0.3% | uniswap_v3 | 0x03a8...9c13 | 0.0177248349143179 |
| VUSD / SPC 0.3% | sushiswap-v3-ethereum | 0x2738...84da | 0.01783611095 |
| SPC / USDC 1% | uniswap_v3 | 0x125b...345e | 0.03104937729 |
| SPC / DAI 0.3% | uniswap_v3 | 0x1afd...1e38 | 0.0115590914277827 |
| SPC / USDT 0.3% | uniswap-v4-ethereum | 0x2776...11ba | 0.02334442151 |
| SPC / USDT | uniswap_v2 | 0x7277...00ca | 0.01682879169 |
| SPC / USDT 1% | uniswap_v3 | 0x1831...4d54 | 0.03111887061 |
| SPC / USDC | sushiswap | 0x8cf5...3bd6 | 0.028514271 |
| SPC / USDT 0.3% | uniswap_v3 | 0x9e9a...497f | 0.0173215707517868 |
| SPC / DAI | sushiswap | 0xd89a...6769 | 0.0162693636414324900940800859399157676235084370899388041323275626742084719031844235765594824 |
| SPC / WETH | sushiswap | 0xe364...172b | 0.03140779861 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.