| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| HENRY / WETH | uniswap_v2 | 0xa812...33df | 0.00005724223377 |
| HENRY / USDC 7.88% | uniswap-v4-ethereum | 0x851c...9c29 | 0.0002039880333 |
| HENRY / USDC 9.992% | uniswap-v4-ethereum | 0xef88...1ea3 | 0.0001656632804 |
| HENRY / USDC 7.88% | uniswap-v4-ethereum | 0x714e...5759 | 0.0002341009876 |
| HENRY / ETH 2.13% | uniswap-v4-ethereum | 0x44df...a441 | 0.0005408477439 |
| HENRY / USDC 9.992% | uniswap-v4-ethereum | 0xc796...d927 | 0.00058652582 |
| HENRY / USDC 7.879% | uniswap-v4-ethereum | 0x0782...953a | 0.00005636267577 |
| HENRY / USDC 9.992% | uniswap-v4-ethereum | 0x813e...6d7f | 0.0005613324545 |
| HENRY / USDC 9.899% | uniswap-v4-ethereum | 0x789e...a0d3 | 0.0005852261431 |
| HENRY / USDC 10% | uniswap-v4-ethereum | 0xb805...9144 | 0.0007286992098 |
| HENRY / USDC 14.9% | uniswap-v4-ethereum | 0x97b4...033f | 0.0003051059013 |
| HENRY / USDC 9.898% | uniswap-v4-ethereum | 0xceb0...7620 | 0.0007673543039 |
| HENRY / USDC 9.79% | uniswap-v4-ethereum | 0x8c0d...8786 | 0.0005539388066 |
| HENRY / USDC 9.99% | uniswap-v4-ethereum | 0x96c6...6052 | 0.0003373323664 |
| HENRY / USDC 9.79% | uniswap-v4-ethereum | 0x2f04...ca3b | 0.0006928042864 |
| HENRY / USDC 9.989% | uniswap-v4-ethereum | 0x3bb4...982f | 0.0007319966662 |
| HENRY / USDT 4.58% | uniswap-v4-ethereum | 0xa4f3...dcf5 | 0.0001354583799 |
| HENRY / USDC 7.999% | uniswap-v4-ethereum | 0xbbd4...1ca7 | 0.0001323061536 |
| HENRY / USDC 4.983% | uniswap-v4-ethereum | 0x7973...a1b9 | 0.0002641845728 |
| HENRY / USDC 9.433% | uniswap-v4-ethereum | 0x4827...303d | 0.0004101922375 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.