| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| STBU / USDT | uniswap_v2 | 0x18f2...60e5 | 0.002267803901 |
| STBU / USDT 0.05% | uniswap_v3 | 0xf038...045d | 0.002418935775 |
| STBU / USDT 1% | uniswap-v4-ethereum | 0x6b3b...ce09 | 0.002779346698 |
| STBU / USDC 96.34% | uniswap-v4-ethereum | 0x91c5...a5fb | 0.001147140181 |
| STBU / USDC 95.94% | uniswap-v4-ethereum | 0x67e0...4133 | 0.001510274825 |
| USDC / STBU 88% | uniswap-v4-ethereum | 0x4adf...ad45 | 0.001111826157 |
| STBU / USDT 0.3% | uniswap_v3 | 0x390a...7ceb | 0.009975832265 |
| STBU / USDT 0.01% | uniswap-v4-ethereum | 0x6fda...0ea5 | 0.01792503393 |
| STBU / USDT 1% | uniswap_v3 | 0xf06e...6062 | 0.181650743668665 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.