| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| NGL / USDT 89.998% | uniswap-v4-ethereum | 0xc705...065e | 0.00210004336292932 |
| NGL / ETH 80% | uniswap-v4-ethereum | 0xe8c9...5e12 | 0.00213364104878165 |
| NGL / USDT 89.999% | uniswap-v4-ethereum | 0xcf39...7b8b | 0.003575044922 |
| NGL / USDT 90% | uniswap-v4-ethereum | 0x2e34...fa53 | 0.0002369781885 |
| NGL / ETH 70% | uniswap-v4-ethereum | 0x33a0...f254 | 0.0002339693816 |
| NGL / USDC | uniswap_v2 | 0xb8b7...90fc | 0.02392189378 |
| NGL / ETH 75% | uniswap-v4-ethereum | 0x4a1e...0836 | 0.0214120311 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.