| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| EIG / SEV 0.3% | balancer-v3-ethereum | 0x70ae...929e | 410.2340284041 |
| ONE / SEV 0.3% | balancer-v3-ethereum | 0x0ff2...7a07 | 525.814443799 |
| SEV / USDC 0.3% | balancer-v3-ethereum | 0x9d0b...3d30 | 23.0613562724 |
| SEV / ETH 0.3% | uniswap-v4-ethereum | 0xccb2...0ae2 | 522.2032551833 |
| EIG / SEV 0.3% | uniswap-v4-ethereum | 0x86c1...b73a | 511.9548517692 |
| SEV / USDC 0.3% | uniswap-v4-ethereum | 0xe531...5843 | 22.9907042688 |
| ONE / SEV 1% | balancer-v3-ethereum | 0x8d00...7ad0 | 22.9704030754 |
| ONE / SEV 0.3% | uniswap-v4-ethereum | 0xd605...65d3 | 527.4706553219 |
| SEV / NIN 0.3% | uniswap-v4-ethereum | 0xdb32...47d3 | 513.1345413011 |
| ONE / SEV 1% | uniswap-v4-ethereum | 0x4695...113e | 23.3192032127 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.