Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
MOODENG / WETH | uniswap_v2 | 0x470d...a03d | 0.0000273844816195323 |
MOODENG / USD1 | uniswap_v2 | 0x5013...7525 | 0.0000281810691199856 |
MOODENG / WETH 1% | uniswap_v3 | 0x5552...4fd8 | 0.0000281587251856089 |
MOODENG / Neiro 1% | uniswap_v3 | 0xf8a8...4578 | 0.0000280263172557963 |
MOODENG / ETH 20% | uniswap-v4-ethereum | 0x4b6a...8965 | 0.00002379308028 |
MOODENG / TREAT 1% | uniswap-v4-ethereum | 0xcd4c...2bba | 0.0000260252546132346 |
MOODENG / ETH 1% | uniswap-v4-ethereum | 0x10b6...6b06 | 0.00003592452447 |
MOODENG / WETH 0.3% | uniswap_v3 | 0x43aa...d467 | 0.000150743428851139 |
MOODENG / HENLO 0.3% | uniswap_v3 | 0x454f...9627 | 0.000209618764667284 |
MOODENG / Neiro | uniswap_v2 | 0xf1a4...3be7 | 0.000200930958169074 |
MOODENG / KABOSU | uniswap_v2 | 0xec19...99f0 | 0.00003657116795 |
MOODENG / USD1 1% | uniswap_v3 | 0x6c3c...8193 | 0.00003092166893 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.