Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
HLX / TITANX 1% | uniswap_v3 | 0x2c83...689c | 0.000000180083188580439 |
HLX / ELMNT | uniswap_v2 | 0xcc4d...f30e | 0.00000018041210946685 |
HLX / H420 1% | uniswap_v3 | 0x1456...5934 | 0.00000018041210946685 |
HLX / JAKEX 1% | uniswap_v3 | 0x1f35...c2e1 | 0.000000178875350793003 |
HLX / LPM 1% | uniswap_v3 | 0x5a8d...84bc | 0.00000019266342828214 |
HLX / SHOGUN | uniswap_v2 | 0x0621...7d01 | 0.000000154981274007947 |
HLX / VOLT 1% | uniswap_v3 | 0x9e14...2db8 | 0.000001173472067 |
HLX / ANT 1% | uniswap_v3 | 0x0657...bee1 | 0.00000100548390357172 |
HLX / ALIENX | uniswap_v2 | 0xf706...2149 | 0.0000004719428122 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.