| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| NGL / USDC 90% | uniswap-v4-ethereum | 0x1141...114c | 0.000000131674951820246 |
| NGL / USDT 88% | uniswap-v4-ethereum | 0xac2d...a187 | 0.000007381786366 |
| NGL / ETH 30% | uniswap-v4-ethereum | 0x424e...f295 | 0.001693540061 |
| NGL / USDC 49% | uniswap-v4-ethereum | 0xd296...48b0 | 0.0000004003399272 |
| NGL / WETH 0.3% | uniswap_v3 | 0xd324...e897 | 0.003138444368 |
| NGL / USDC 99.91% | uniswap-v4-ethereum | 0x9af4...ccd4 | 0.000004185950115 |
| NGL / USDC 99% | uniswap-v4-ethereum | 0xcddd...8843 | 0.000004209813733 |
| NGL / USDC 1% | uniswap_v3 | 0x3b3e...90e2 | 0.00001553433566 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.