| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| MOODENG / WETH | uniswap_v2 | 0x470d...a03d | 0.0000155831434017699 |
| MOODENG / KABOSU | uniswap_v2 | 0xec19...99f0 | 0.0000157034843463803 |
| MOODENG / USDT 20% | uniswap-v4-ethereum | 0x89c6...ef2a | 0.0000181840686533142 |
| MOODENG / WETH 1% | uniswap_v3 | 0x5552...4fd8 | 0.0000167582311242748 |
| MOODENG / ETH 20% | uniswap-v4-ethereum | 0x4b6a...8965 | 0.00002808814036 |
| MOODENG / TREAT 1% | uniswap-v4-ethereum | 0xcd4c...2bba | 0.0000153881629256832 |
| MOODENG / ETH 1% | uniswap-v4-ethereum | 0x10b6...6b06 | 0.00003592452447 |
| MOODENG / Neiro 1% | uniswap_v3 | 0xf8a8...4578 | 0.00001241205773 |
| MOODENG / USD1 | uniswap_v2 | 0x5013...7525 | 0.00001110568541 |
| MOODENG / USD1 1% | uniswap_v3 | 0x6c3c...8193 | 0.00003092166893 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.