| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| NMT / USDC 0.3% | uniswap_v3 | 0x6cbe...4a51 | 0.114745610150578 |
| NMT / USDC 0.25% | pancakeswap-v3-ethereum | 0x93c0...6a69 | 2.1726534812 |
| NMT / USDT 4% | uniswap-v4-ethereum | 0xa2a8...0ef9 | 0.1270369441 |
| NMT / USDT 1% | uniswap_v3 | 0x1534...d629 | 3.4705903786 |
| NMT / USDC | uniswap_v2 | 0xa86a...8dff | 0.4748428991 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.