| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| HEX / WETH | uniswap_v2 | 0x55d5...4dba | 0.00102937862579507 |
| HEX / WETH 0.3% | uniswap_v3 | 0x9e09...8be6 | 0.00103048481691737 |
| HEX / USDC 0.3% | uniswap_v3 | 0x69d9...18d5 | 0.00103442819785949 |
| HEX / USDC | uniswap_v2 | 0xf6dc...5824 | 0.00103491460373703 |
| HEX / ETH 0.3% | uniswap-v4-ethereum | 0xe093...2b36 | 0.00103615460706693 |
| ICSA / HEX | uniswap_v2 | 0xbaaf...6b41 | 0.00104673352049791 |
| HEX / HDRN | uniswap_v2 | 0x035a...014e | 0.00104673352049791 |
| HEX / ICSA 1% | uniswap_v3 | 0x82de...ad03 | 0.00104361476124046 |
| HEX / DRAK 0.3% | uniswap_v3 | 0x1d5d...834f | 0.00103690598892498 |
| HEX / 9INCH | 9inch-ethereum | 0xa759...e519 | 0.00103054789057861 |
| HEX / COM | 9inch-ethereum | 0x8ffd...a92d | 0.0010458490378148 |
| HEX / USDT | uniswap_v2 | 0xbbb9...53f6 | 0.0010289351717315 |
| HEX / VVV | uniswap_v2 | 0x746e...bdff | 0.00103054789057861 |
| HEX / WETH | 9inch-ethereum | 0x2feb...f9bb | 0.00103725833421603 |
| HEX / ZIK 1% | uniswap-v4-ethereum | 0x83c6...50d7 | 0.00107170247571387 |
| HEX / USDT 1% | uniswap-v4-ethereum | 0x2028...4e4d | 0.00103396014894266 |
| HEX / USDC 1% | uniswap-v4-ethereum | 0x3f3b...4a3d | 0.00102897339430053 |
| HEX / WETH 1% | uniswap_v3 | 0x8274...9bd0 | 0.00104953749470099 |
| HEX / WBTC | uniswap_v2 | 0x96da...f560 | 0.00105203417264826 |
| HEX / HDRN 1% | uniswap_v3 | 0x4a97...3931 | 0.000975630374998026 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.