| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| SG / USDT | uniswap_v2 | 0xd999...cda2 | 0.000138449783493088 |
| USDC / SG 50% | uniswap-v4-ethereum | 0xe2b2...569a | 0.000178829855665738 |
| SG / ETH 50% | uniswap-v4-ethereum | 0x8063...e8e2 | 0.00007848399747 |
| USDT / SG 8% | uniswap-v4-ethereum | 0xcf92...7aa6 | 0.00007601243772 |
| USDT / SG 13% | uniswap-v4-ethereum | 0xfaa0...24a0 | 0.00008679561126 |
| FTW / SG 0.3% | uniswap-v4-ethereum | 0xc21a...5c66 | 0.000122628006901216 |
| cbETH / SG 0.3% | uniswap-v4-ethereum | 0x6277...89f5 | 0.000150328708169417 |
| SG / WETH 1% | uniswap_v3 | 0xbc2f...970e | 1.537307130619277240238574250483 |
| SNL / SG 0.3% | uniswap-v4-ethereum | 0x3375...cd62 | 0.000122628006901216 |
| SG / ETH 0.3% | uniswap-v4-ethereum | 0x0e48...bc74 | 0.0003810006116 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.