| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| STFX / USDC 80% | uniswap-v4-ethereum | 0xa3b8...29e6 | 0.00001237497507 |
| STFX / USDT 80% | uniswap-v4-ethereum | 0x036b...c843 | 0.0008932507695 |
| STFX / ETH 90% | uniswap-v4-ethereum | 0xf9e1...acfb | 0.0005197797775 |
| STFX / USDC 1% | uniswap_v3 | 0x9bf2...f2b4 | 0.07153536796 |
| STFX / WETH 0.3% | uniswap_v3 | 0x2d6f...4653 | 0.01131842317 |
| STFX / USDC 75% | uniswap-v4-ethereum | 0x3d9b...6ac4 | 0.0008298488519 |
| STFX / USDT 1% | uniswap_v3 | 0x1607...42d6 | 0.0513082341373873 |
| STFX / USDC 0.3% | uniswap_v3 | 0x28d8...d3d7 | 0.0350520274858776 |
| STFX / WETH 1% | uniswap_v3 | 0x753e...93e6 | 0.298416689164212 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.