| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| SDAO / WETH | uniswap_v2 | 0x4244...12fb | 0.0114457035772553 |
| SDAO / USDT | uniswap_v2 | 0x3a92...6acb | 0.0114815267868241 |
| SDAO / WETH | pancakeswap_ethereum | 0xda7c...39ca | 0.0116057500796318 |
| SDAO / USDT | orion-ethereum | 0xb2e8...c72d | 0.0120235162037015 |
| SFI / SDAO 1% | uniswap_v3 | 0x65e7...47b7 | 0.01454473237 |
| SDAO / WETH 1% | uniswap_v3 | 0x4b9d...a263 | 0.01287071053 |
| SFI / SDAO 5% | uniswap-v4-ethereum | 0x8bc6...4ebb | 0.03781759843 |
| UFARM / SDAO | uniswap_v2 | 0xd24e...4086 | 0.0126399008770306 |
| SDAO / WETH 0.3% | uniswap_v3 | 0xfc3d...bdc7 | 0.01538963399 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.