Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
SFI / WETH | uniswap_v2 | 0xc762...6cd6 | 22.8428154921257 |
SFI / WETH | sushiswap | 0x23a9...8624 | 22.8320153554351 |
SFI / BTSE | uniswap_v2 | 0xfff4...094e | 22.7744845004341 |
SFI / ALPHA | uniswap_v2 | 0x8388...1620 | 22.8247523589207 |
SFI / ESD | uniswap_v2 | 0x66f4...1eda | 22.7773400253331 |
SFI / WETH 0.3% | uniswap_v3 | 0x122c...0f2b | 23.2761927753 |
SFI / GEEQ | uniswap_v2 | 0x5956...e1da | 23.8995601375 |
SFI / PRT | uniswap_v2 | 0x80e4...990f | 22.0761700022 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.