| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| HTX / TRX | uniswap_v2 | 0xaca1...c98d | 0.00000150088581 |
| HTX / WETH | uniswap_v2 | 0xf760...bd34 | 0.000001717176792 |
| HTX / ETH 9.9% | uniswap-v4-ethereum | 0x0cf0...c7f3 | 0.000001472948961 |
| HTX / ETH 50% | uniswap-v4-ethereum | 0x0f0d...f0b3 | 0.000001412817455 |
| HTX / USDC 85.5% | uniswap-v4-ethereum | 0xfbd9...df05 | 0.000001102977361 |
| HTX / USDT 1% | uniswap-v4-ethereum | 0x4209...e5ee | 0.000001436619881 |
| HTX / WETH 1% | uniswap_v3 | 0x23a0...1519 | 0.000002443759953 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.