Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
HIFI / USDC 0.01% | uniswap-v4-ethereum | 0xf2f4...2796 | 0.16995571495941 |
HIFI / WETH 1% | uniswap_v3 | 0x6a92...224c | 0.213293450370312 |
HIFI / USDC 1% | uniswap_v3 | 0xc448...8ed5 | 1.0042427916 |
HIFI / USDT 20% | uniswap-v4-ethereum | 0x4821...504f | 0.207327873162702 |
SHEETp / HIFI 1% | uniswap_v3 | 0xf6da...6c4a | 0.718716942913069 |
HIFI / BOTSp 0.3% | uniswap_v3 | 0xa606...9287 | 0.390642389566605068706936067501100754788940064 |
HIFI / USDC 0.3% | uniswap_v3 | 0x12da...8017 | 0.647299473116134 |
HIFI / KABOSU | uniswap_v2 | 0x785a...097c | 0.3195114063 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.