Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
MOODENG / WETH | uniswap_v2 | 0x470d...a03d | 0.0000326630495553266 |
MOODENG / WETH 1% | uniswap_v3 | 0x5552...4fd8 | 0.000032425242483745 |
MOODENG / TREAT 1% | uniswap-v4-ethereum | 0xcd4c...2bba | 0.0000325658542684372 |
MOODENG / ETH 20% | uniswap-v4-ethereum | 0x4b6a...8965 | 0.0000342429667244391 |
MOODENG / ETH 1% | uniswap-v4-ethereum | 0x10b6...6b06 | 0.00003592452447 |
MOODENG / WETH 0.3% | uniswap_v3 | 0x43aa...d467 | 0.000150743428851139 |
MOODENG / HENLO 0.3% | uniswap_v3 | 0x454f...9627 | 0.000209618764667284 |
MOODENG / Neiro | uniswap_v2 | 0xf1a4...3be7 | 0.000200930958169074 |
MOODENG / KABOSU | uniswap_v2 | 0xec19...99f0 | 0.00003657116795 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.