| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| SFI / WETH | uniswap_v2 | 0xc762...6cd6 | 91.7047252415 |
| SFI / WETH | sushiswap | 0x23a9...8624 | 91.4121182889 |
| SFI / WETH 0.3% | uniswap_v3 | 0x122c...0f2b | 91.3002861988 |
| SFI / BTSE | uniswap_v2 | 0xfff4...094e | 91.9888026795 |
| SFI / ESD | uniswap_v2 | 0x66f4...1eda | 89.5159410448 |
| SFI / ALPHA | uniswap_v2 | 0x8388...1620 | 90.001547321 |
| SFI / PRT | uniswap_v2 | 0x80e4...990f | 84.2259563963 |
| SFI / ETH 0.01% | uniswap-v4-ethereum | 0x9c37...14d6 | 35.6249785919 |
| SFI / ETH 2.3% | uniswap-v4-ethereum | 0xe958...3ce0 | 289.3375097034 |
| SFI / ETH 2.5% | uniswap-v4-ethereum | 0x052e...7d73 | 288.5465246057 |
| SFI / ETH 2.6% | uniswap-v4-ethereum | 0x7ea5...19ce | 281.6670389145 |
| USDC / SFI 1% | uniswap_v3 | 0xe71a...0ecd | 98.1252132873452 |
| SFI / USDT 1% | uniswap-v4-ethereum | 0x303e...85d0 | 99.6179028229 |
| SFI / ETH 2% | uniswap-v4-ethereum | 0x6e93...3fe9 | 231.0426407032 |
| USDC / SFI 88% | uniswap-v4-ethereum | 0x4d04...e8d1 | 379.1992964006 |
| SFI / ETH 2.7% | uniswap-v4-ethereum | 0xca28...a872 | 286.7048196767 |
| SFI / ETH 2.2% | uniswap-v4-ethereum | 0xfc58...a398 | 306.010294402 |
| SFI / ETH 1% | uniswap-v4-ethereum | 0xf725...c7eb | 34.2448777393 |
| SFI / ETH 2.1% | uniswap-v4-ethereum | 0xce54...eb84 | 308.6780638387 |
| SFI / ETH 2.4% | uniswap-v4-ethereum | 0x692f...50ff | 304.3283978905 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.