| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| SHIB / WETH | shibaswap | 0xcf6d...deaa | 0.00000856136457306107 |
| SHIB / WETH 0.3% | uniswap_v3 | 0x2f62...a9ec | 0.0000086161446268909 |
| SHIB / WETH | uniswap_v2 | 0x811b...954f | 0.00000861507356580385 |
| SHIB / BONE | shibaswap | 0xff64...ee22 | 0.00000862931627981868 |
| SHIB / WETH 1% | uniswap_v3 | 0x5764...7563 | 0.0000085699050822137 |
| SHIB / USDT | shibaswap | 0x98c2...1631 | 0.00000864424064100936 |
| SHIB / USDC | shibaswap | 0x9379...b0a4 | 0.00000859955606906076 |
| SHIB / ETH 1% | uniswap-v4-ethereum | 0x2842...7379 | 0.00000860456786906061 |
| SHIB / UNI 1% | uniswap_v3 | 0xe07c...e705 | 0.00000878657557038245 |
| SOTU / SHIB | uniswap_v2 | 0x14a8...200a | 0.0000086155928084594 |
| SHIB / USDT | uniswap_v2 | 0x773d...8cc8 | 0.00000859381434095637 |
| PEPE / SHIB 1% | uniswap_v3 | 0x2488...9db1 | 0.00000878263273456199 |
| SHIB / OSAK | uniswap_v2 | 0x9ad3...48d9 | 0.00000861139774563414 |
| SHIB / ODIN | uniswap_v2 | 0x3feb...61d1 | 0.00000859962025846207 |
| SHIB / USDC 0.3% | uniswap-v4-ethereum | 0x98c3...9de5 | 0.00000860137721464527 |
| SHIB / USDT 0.3% | uniswap_v3 | 0xb0cc...59c4 | 0.00000863017188162388 |
| LEASH / SHIB | shibaswap | 0x351c...7a8f | 0.00000863823790914733 |
| SHIB / WETH 0.05% | uniswap_v3 | 0x94e4...c723 | 0.00000860103998145764 |
| MATIC / SHIB | shibaswap | 0x256a...ca8a | 0.00000863823790914733 |
| BURN / SHIB | sushiswap | 0x2584...523a | 0.00000875262018946024 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.