| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| HEX / HDRN | uniswap_v2 | 0x035a...014e | 0.00000000604001115220404 |
| HDRN / ICSA 1% | uniswap_v3 | 0x4676...fb07 | 0.000000005483131809 |
| HDRN / HDRN | uniswap_v2 | 0x493f...bd38 | 0.0000000054892167375151 |
| HDRN / USDC 1% | uniswap_v3 | 0xe859...a26e | 0.000000006038415771 |
| HDRN / VVV | uniswap_v2 | 0xf259...01c9 | 0.000000005488246796 |
| HEX / HDRN 1% | uniswap_v3 | 0x4a97...3931 | 0.00000000605084123994745 |
| HEX / HDRN 1% | uniswap-v4-ethereum | 0x35c5...8cc0 | 0.00000000538966453715397 |
| HDRN / TEXAN 1% | uniswap_v3 | 0x2efa...0932 | 0.000000005557892547 |
| HEX / HDRN 0.3% | uniswap_v3 | 0xdd47...2077 | 0.0000000055578925467535 |
| HDRN / ETH 1% | uniswap-v4-ethereum | 0x6041...caf1 | 0.000000005206266435 |
| HDRN / WETH | uniswap_v2 | 0x319e...9758 | 0.000000005151353697 |
| HDRN / WETH 1% | uniswap_v3 | 0xf745...0c68 | 0.000000004988044788 |
| HDRN / ePhiat 1% | uniswap_v3 | 0x17f6...23ab | 0.000000003770995158 |
| HDRN / WETH 0.3% | uniswap_v3 | 0x78d4...2c71 | 0.0000002357045588 |
| PLSD / HDRN 1% | uniswap_v3 | 0x2ce2...0dec | 0.0000000284823424 |
| HDRN / USDC 0.3% | uniswap_v3 | 0xb5ee...0298 | 0.00000392285872207693456625000859414 |
| HDRN / USDC | uniswap_v2 | 0x841b...bfe4 | 0.000000005194729523 |
| HDRN / POLY 1% | uniswap_v3 | 0x4297...96bc | 0.00000007562533142 |
| MAXI / HDRN 0.3% | uniswap_v3 | 0x2b09...9665 | 0.00000205378089733296553723581976128 |
| HDRN / ICSA | uniswap_v2 | 0xc381...7355 | 0.000000004300623378 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.