Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
HDRN / USDC | uniswap_v2 | 0x841b...bfe4 | 0.0000000886941228830672 |
HEX / HDRN | uniswap_v2 | 0x035a...014e | 0.0000000708458934141438 |
HEX / HDRN 1% | uniswap_v3 | 0x4a97...3931 | 0.0000000732545034621703 |
HDRN / ICSA 1% | uniswap_v3 | 0x4676...fb07 | 0.0000000698338074773065 |
HDRN / HDRN | uniswap_v2 | 0x493f...bd38 | 0.0000000710196751191322 |
HDRN / TEXAN 1% | uniswap_v3 | 0x2efa...0932 | 0.0000000723305991785604 |
HDRN / VVV | uniswap_v2 | 0xf259...01c9 | 0.0000000722991263600424 |
HDRN / WETH 0.3% | uniswap_v3 | 0x78d4...2c71 | 0.0000000831674348233645 |
HDRN / ePhiat 1% | uniswap_v3 | 0x17f6...23ab | 0.000000261207423735597 |
HDRN / USDC 1% | uniswap_v3 | 0xe859...a26e | 0.0000000732396563270592 |
HDRN / WETH 1% | uniswap_v3 | 0xf745...0c68 | 0.000000221538699026173 |
HEX / HDRN 0.3% | uniswap_v3 | 0xdd47...2077 | 0.0000000529167117447424 |
HDRN / TEAM 1% | uniswap_v3 | 0xc787...e28b | 0.0000000862384206032302 |
HDRN / POLY 1% | uniswap_v3 | 0x4297...96bc | 0.000000305119784840816 |
PLSD / HDRN 1% | uniswap_v3 | 0x2ce2...0dec | 0.000000134963160210338 |
POLY / HDRN 0.3% | uniswap_v3 | 0x1c1c...1fd2 | 0.000000224208778748631 |
HDRN / WETH | uniswap_v2 | 0x319e...9758 | 0.0000000482684076353115 |
HDRN / ACR | uniswap_v2 | 0x1bb9...0a1e | 0.00000217357253559582742482692737513677850119275167802310194664942372738325062453169096211483728 |
HDRN / USDC 0.3% | uniswap_v3 | 0xb5ee...0298 | 0.00000392285872207693456625000859414 |
MAXI / HDRN 0.3% | uniswap_v3 | 0x2b09...9665 | 0.00000205378089733296553723581976128 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.