| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| SDAO / WETH | uniswap_v2 | 0x4244...12fb | 0.0172599959781186 |
| SDAO / USDT | uniswap_v2 | 0x3a92...6acb | 0.0172983200482702 |
| SDAO / WETH | pancakeswap_ethereum | 0xda7c...39ca | 0.0180313806181329 |
| SFI / SDAO 1% | uniswap_v3 | 0x65e7...47b7 | 0.02206901463 |
| SDAO / WETH 1% | uniswap_v3 | 0x4b9d...a263 | 0.01764837196 |
| SDAO / USDT | orion-ethereum | 0xb2e8...c72d | 0.0175232825549389 |
| SFI / SDAO 5% | uniswap-v4-ethereum | 0x8bc6...4ebb | 0.03781759843 |
| UFARM / SDAO | uniswap_v2 | 0xd24e...4086 | 0.01740313194 |
| SDAO / WETH 0.3% | uniswap_v3 | 0xfc3d...bdc7 | 0.02056957133 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.