| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| SHOGUN / X28 | uniswap_v2 | 0x2585...ed9f | 0.0000757460237772333 |
| SHOGUN / PHX | uniswap_v2 | 0x80d2...16ec | 0.0000773265563768163 |
| MATRIX / SHOGUN | uniswap_v2 | 0xd7d8...829b | 0.0000773265563768163 |
| HYPER / SHOGUN | uniswap_v2 | 0x3f7d...5e66 | 0.0000748874201151592 |
| FLARE / SHOGUN | uniswap_v2 | 0xb55a...1780 | 0.000071988295590688 |
| DRAGONX / SHOGUN | uniswap_v2 | 0xa35c...db74 | 0.0000676796783069678 |
| ELMNT / SHOGUN | uniswap_v2 | 0xf77e...4330 | 0.000069081158299833 |
| INF / SHOGUN | uniswap_v2 | 0xe942...59f4 | 0.0000698508496582352 |
| VOLT / SHOGUN | uniswap_v2 | 0xf0b1...5394 | 0.00005862333513 |
| MORPH / SHOGUN | uniswap_v2 | 0xbac5...f066 | 0.000069081158299833 |
| HLX / SHOGUN | uniswap_v2 | 0x0621...7d01 | 0.00005951637374 |
| STAX / SHOGUN | uniswap_v2 | 0xe481...844e | 0.0000696035827379295 |
| ORX / SHOGUN | uniswap_v2 | 0x5aea...cf1a | 0.0000683296841271146 |
| HYDRA / SHOGUN | uniswap_v2 | 0x1024...fbe5 | 0.00006291433996 |
| GOATX / SHOGUN | uniswap_v2 | 0xf18b...952e | 0.00006179335592 |
| VYPER / SHOGUN | uniswap_v2 | 0x6062...baad | 0.00006068006552 |
| AWX / SHOGUN | uniswap_v2 | 0xc409...96b3 | 0.00006179335592 |
| BDX / SHOGUN | uniswap_v2 | 0xb093...c253 | 0.00006079170893 |
| LGNDX / SHOGUN | uniswap_v2 | 0xf8dc...0a2a | 0.0000683296841271146 |
| TURBO / SHOGUN | uniswap_v2 | 0xda71...42c0 | 0.000071988295590688 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.