| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| SHIB / WETH | shibaswap | 0xcf6d...deaa | 0.00000558873791373157 |
| SHIB / WETH | uniswap_v2 | 0x811b...954f | 0.00000559108396650924 |
| SHIB / WETH 0.3% | uniswap_v3 | 0x2f62...a9ec | 0.0000056165527726497 |
| SHIB / WETH 1% | uniswap_v3 | 0x5764...7563 | 0.0000055858933111684 |
| SHIB / BONE | shibaswap | 0xff64...ee22 | 0.00000560540761090711 |
| SHIB / UNI 1% | uniswap_v3 | 0xe07c...e705 | 0.00000554048349479688 |
| SHIB / USDT | shibaswap | 0x98c2...1631 | 0.00000557741564628875 |
| SHIB / USDC | shibaswap | 0x9379...b0a4 | 0.00000560728146572459 |
| SHIB / ETH 1% | uniswap-v4-ethereum | 0x2842...7379 | 0.00000546377395649563 |
| SOTU / SHIB | uniswap_v2 | 0x14a8...200a | 0.00000560779813592532 |
| SHIB / USDT | uniswap_v2 | 0x773d...8cc8 | 0.00000565599479254913 |
| SHIB / USDC 0.3% | uniswap-v4-ethereum | 0x98c3...9de5 | 0.00000557836331856036 |
| PEPE / SHIB 1% | uniswap_v3 | 0x2488...9db1 | 0.00000554278516542426 |
| SHIB / WETH 0.05% | uniswap_v3 | 0x94e4...c723 | 0.00000552816649732371 |
| SHIB / DI 1% | uniswap_v3 | 0x4cd9...4ab4 | 0.00000549012954748885 |
| SHIB / ODIN | uniswap_v2 | 0x3feb...61d1 | 0.0000056251666279656 |
| SHIB / OSAK | uniswap_v2 | 0x9ad3...48d9 | 0.00000559713678988125 |
| MATIC / SHIB | shibaswap | 0x256a...ca8a | 0.00000555340739181336 |
| MM / SHIB | shibaswap | 0x89d5...f4c2 | 0.0000055589080352362 |
| SHIB / TREAT | shibaswap | 0x66ef...b67b | 0.00000547487494871281 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.