| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| SURE / USDC 99.9% | uniswap-v4-ethereum | 0xd831...d7fb | 0.00002888671871 |
| SURE / WETH 0.3% | uniswap_v3 | 0x119f...e145 | 0.0006559658231 |
| USDC / SURE 90.5% | uniswap-v4-ethereum | 0x607f...9bba | 0.0001218580637 |
| USDC / SURE 95.1% | uniswap-v4-ethereum | 0x8de6...a294 | 0.00003031863465 |
| USDC / SURE 90% | uniswap-v4-ethereum | 0x982d...aaab | 0.000255573254 |
| SURE / USDT 88% | uniswap-v4-ethereum | 0x4146...f10b | 0.00003028924432 |
| SURE / USDT 50% | uniswap-v4-ethereum | 0xe1d1...d789 | 0.0002669950221 |
| USDC / SURE 99.99% | uniswap-v4-ethereum | 0x6cd9...cbab | 0.00007259304604 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.