Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
ANDY / WETH | uniswap_v2 | 0xa1bf...c2c0 | 0.0000385334055753333 |
ANDY / WETH 1% | uniswap_v3 | 0x2b85...284e | 0.0000379716651323153 |
BRETT / ANDY 1% | uniswap_v3 | 0xa4ef...1caa | 0.000036180871125258 |
WOLF / ANDY 0.3% | uniswap-v4-ethereum | 0x50b6...f95a | 0.0000341240762691713 |
$MaxETH / ANDY 1% | uniswap_v3 | 0xa24a...8ceb | 0.0000360285886708875 |
ANDY / BOYS 0.3% | uniswap-v4-ethereum | 0xc278...14da | 0.0000449254395 |
ANDY / BOYS 1% | uniswap_v3 | 0xbde6...5b8c | 0.00006297481626 |
ANDY / ETH 0.3% | uniswap-v4-ethereum | 0xb6dd...8352 | 0.0000355334296636052 |
WOLF / ANDY 1% | uniswap_v3 | 0xc6ae...35be | 0.0000568324780477731 |
ANDY / BOYS | uniswap_v2 | 0x9274...8318 | 0.0000697599513018422 |
ANDY / WETH 0.3% | uniswap_v3 | 0xbede...6b5d | 0.0000690238817804547 |
WOLF / ANDY 0.3% | uniswap_v3 | 0x51dd...53b2 | 0.0000552634842552384 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.