| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| HEGIC / WETH | sushiswap | 0x6463...0eb6 | 0.0235337850399746 |
| HEGIC / WETH 1% | uniswap_v3 | 0xf2c3...cc82 | 0.0231951099504766 |
| HEGIC / WETH | uniswap_v2 | 0x1273...3fc3 | 0.0233889901844978 |
| HEGIC / DAI | uniswap_v2 | 0x5027...8e7b | 0.0234944845863021 |
| zHEGIC / HEGIC | uniswap_v2 | 0x6ddc...3ee4 | 0.02446289277 |
| HEGIC / KP3R | sushiswap | 0x19bf...96f6 | 0.02413142377 |
| HEGIC / ETH 1% | uniswap-v4-ethereum | 0x253d...9c9e | 0.03171550108 |
| POOL / CREAM / HEGIC / LQTY / AXS / PERP / WETH / ALCX 2% | balancer_ethereum | 0xdb3e...5df3 | 0.6852056935 |
| HEGIC / zHEGIC 0.3% | uniswap_v3 | 0xb747...7791 | 0.02329681642 |
| RUNE / HEGIC | sushiswap | 0x38b1...05dd | 0.02270293343 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.