| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| STND / WETH | uniswap_v2 | 0xe942...8d09 | 0.000772230885648868 |
| STND / USDC | standard_ethereum | 0xe8d3...a9ca | 0.000807567215323291 |
| STND / WETH | sushiswap | 0xf52e...095a | 0.000858582416657665 |
| STND / Metis | standard_ethereum | 0x7149...bfec | 0.000843601806556593 |
| STND / USDT 50% | uniswap-v4-ethereum | 0xbd92...c18b | 0.001182808629 |
| dSTND / STND | standard_ethereum | 0xc939...8fb3 | 0.003180264621 |
| STND / WETH | standard_ethereum | 0x895d...7eb4 | 0.000862890584406428 |
| STND / USDC 88% | uniswap-v4-ethereum | 0x74d6...5e10 | 0.0003194517691 |
| STND / WETH 0.3% | uniswap_v3 | 0x708e...fc85 | 0.2134792215 |
| PIST / STND | standard_ethereum | 0x877e...b08b | 0.001585040981 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.