| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| MAXI / HEX 0.3% | uniswap-v4-ethereum | 0x768d...10df | 0.003230748209 |
| MAXI / HEX | uniswap_v2 | 0xbf03...b2c8 | 0.00119180262983856 |
| MAXI / HEX 0.3% | uniswap_v3 | 0x2ae4...6490 | 0.00128302519160026 |
| MAXI / USDC 1% | uniswap_v3 | 0xf559...1149 | 0.01130748429 |
| MAXI / ICSA 1% | uniswap_v3 | 0xa5f8...37e2 | 0.005670059509 |
| MAXI / ETH 0.3% | uniswap-v4-ethereum | 0xf04a...284c | 0.0003845577259 |
| MAXI / WETH 1% | uniswap_v3 | 0x8234...d906 | 1.9785554648 |
| MAXI / HEX 1% | uniswap_v3 | 0x89c3...e608 | 0.01118262524 |
| MAXI / TEAM 1% | uniswap_v3 | 0x6952...ac59 | 0.01293913023 |
| MAXI / TEAM | uniswap_v2 | 0xa747...1039 | 0.0637008244303785773174445830679444182842414798127778699110979332252920875054209685379505324317330838347776 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.