| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| $MONG / WETH | uniswap_v2 | 0x7054...775c | 0.00000000143594909354595 |
| $HAMSTR / $MONG 1% | uniswap_v3 | 0xacf3...ff0d | 0.000000001353304189 |
| COBRA / $MONG | uniswap_v2 | 0xd486...8a62 | 0.00000000398136632 |
| PURPLE / $MONG 1% | uniswap_v3 | 0x7eb3...605d | 0.0000000013112213 |
| $MONG / WETH 1% | uniswap_v3 | 0x95ad...4ea5 | 0.00000000133451710069552 |
| $MONG / MING | uniswap_v2 | 0x9e66...3686 | 0.000000004232244809 |
| $MONG / PEPET | uniswap_v2 | 0x0195...9620 | 0.00000000135082124019578 |
| $MONG / PM | uniswap_v2 | 0x7b11...f6d6 | 0.000000001336412538 |
| $MONG / CONG 0.3% | uniswap_v3 | 0xd41a...99b1 | 0.000000002996917621 |
| $MONG / KABOSU | uniswap_v2 | 0xc2e8...4b08 | 0.000000005269091875 |
| YES / $MONG | uniswap_v2 | 0xe717...7be2 | 0.0000000445595827322909 |
| CMON / $MONG | uniswap_v2 | 0xc196...a600 | 0.0000000104806837739594 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.