| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ALPHA / WETH | sushiswap | 0xf55c...4964 | 0.00469109344219015 |
| ALPHA / ibETH | uniswap_v2 | 0x411a...2875 | 0.00470519767802338 |
| ALPHA / WETH | uniswap_v2 | 0x60b2...2931 | 0.00469661081946723 |
| ALPHA / WETH 1% | uniswap_v3 | 0x460d...a852 | 0.00472831423072169 |
| SFI / ALPHA | uniswap_v2 | 0x8388...1620 | 0.00476557766970991 |
| ibETHv2 / ALPHA | sushiswap | 0xf79a...c017 | 0.008411929645 |
| ALPHA / RUNE | sushiswap | 0x72a6...3b2d | 0.004884510461 |
| ALPHA / KABOSU | uniswap_v2 | 0xe59c...7776 | 0.03607191334 |
| stETH / ALPHA | sushiswap | 0x32dd...8972 | 0.005985817095 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.