| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| HEX / HDRN | uniswap_v2 | 0x035a...014e | 0.0000000110376829767481 |
| HDRN / ICSA 1% | uniswap_v3 | 0x4676...fb07 | 0.0000000110904394067832 |
| HDRN / USDC 1% | uniswap_v3 | 0xe859...a26e | 0.0000000110905601082497 |
| HDRN / HDRN | uniswap_v2 | 0x493f...bd38 | 0.00000000911038063167913 |
| HDRN / TEXAN 1% | uniswap_v3 | 0x2efa...0932 | 0.0000000109829533418122 |
| HDRN / VVV | uniswap_v2 | 0xf259...01c9 | 0.0000000110947461070874 |
| HEX / HDRN 0.3% | uniswap_v3 | 0xdd47...2077 | 0.00000000915745423056515 |
| HDRN / WETH | uniswap_v2 | 0x319e...9758 | 0.00000000939117382701298 |
| HDRN / USDC | uniswap_v2 | 0x841b...bfe4 | 0.0000000082708440572888 |
| HEX / HDRN 1% | uniswap_v3 | 0x4a97...3931 | 0.0000000113762110411503 |
| HDRN / WETH 1% | uniswap_v3 | 0xf745...0c68 | 0.0000003110492956 |
| HDRN / WETH 0.3% | uniswap_v3 | 0x78d4...2c71 | 0.0000002357045588 |
| HDRN / ePhiat 1% | uniswap_v3 | 0x17f6...23ab | 0.0000000113328106 |
| HDRN / ICSA | uniswap_v2 | 0xc381...7355 | 0.000000009508574642 |
| HDRN / POLY 1% | uniswap_v3 | 0x4297...96bc | 0.00000007562533142 |
| PLSD / HDRN 1% | uniswap_v3 | 0x2ce2...0dec | 0.0000000284823424 |
| POLY / HDRN 0.3% | uniswap_v3 | 0x1c1c...1fd2 | 0.00000002367207312 |
| HDRN / ACR | uniswap_v2 | 0x1bb9...0a1e | 0.00000003058602056 |
| HDRN / 9INCH | 9inch-ethereum | 0x3b8a...fea8 | 0.00000003572490389 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.