| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| USH / WETH | sushiswap | 0xaaf4...f312 | 0.0003759987318015 |
| unshETH / USH 0.5% | balancer_ethereum | 0xd689...11fd | 0.0003879448969 |
| USH / WETH 0.5% | balancer_ethereum | 0xd278...a460 | 0.000368975803 |
| USH / WETH | pancakeswap_ethereum | 0x36b8...a9d4 | 0.0003659658206 |
| USH / USDC 1% | uniswap_v3 | 0xd494...cc90 | 0.138695267688428 |
| USH / WETH 1% | uniswap_v3 | 0x6003...0463 | 0.479414189215975 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.