| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| AERGO / WETH | sushiswap | 0x9e48...a617 | 0.0514239391513966 |
| AERGO / USDC 45% | uniswap-v4-ethereum | 0xaca9...961e | 0.0521484533407552 |
| AERGO / ETH 30% | uniswap-v4-ethereum | 0xdf53...9650 | 0.1219299463 |
| AERGO / USDT 0.3% | uniswap-v4-ethereum | 0xec1c...e33d | 0.1637356933 |
| AERGO / ETH 10% | uniswap-v4-ethereum | 0x7bc8...8493 | 0.1295691639 |
| AERGO / ETH 50% | uniswap-v4-ethereum | 0xe307...2e57 | 0.07471908444 |
| AERGO / USDT 1% | uniswap-v4-ethereum | 0xddc7...2880 | 0.1189107468 |
| AERGO / WETH | uniswap_v2 | 0x505a...4893 | 0.0610593602215923 |
| AERGO / KABOSU | uniswap_v2 | 0xebc8...dd5d | 0.0802206734 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.