Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
ANDY / WETH | uniswap_v2 | 0xa1bf...c2c0 | 0.0000508198064814749 |
rust / ANDY 1% | uniswap-v4-ethereum | 0xc44e...b3f6 | 0.0000509537578587679 |
ANDY / BOYS 1.5% | uniswap-v4-ethereum | 0x94fe...f916 | 0.0000509537578587679 |
ANDY / WETH 1% | uniswap_v3 | 0x2b85...284e | 0.0000519829242947586 |
BRETT / ANDY 1% | uniswap-v4-ethereum | 0x060e...766e | 0.0000510036146815167 |
$MaxETH / ANDY 1% | uniswap_v3 | 0xa24a...8ceb | 0.0000523551191120957 |
ANDY / ETH 0.3% | uniswap-v4-ethereum | 0xb6dd...8352 | 0.0000512542512355601 |
ANDY / BOYS 0.3% | uniswap-v4-ethereum | 0xc278...14da | 0.0000449254395 |
ANDY / BOYS 1% | uniswap-v4-ethereum | 0x3a4b...4e69 | 0.00003454640509 |
ANDY / BIRDDOG 1% | uniswap-v4-ethereum | 0x0164...2392 | 0.00003654626569 |
ANDY / PEPE 1% | uniswap-v4-ethereum | 0x7f44...ecdf | 0.0000864418915 |
WOLF / ANDY 0.3% | uniswap-v4-ethereum | 0x50b6...f95a | 0.00003613028124 |
ANDY / ETH 1% | uniswap-v4-ethereum | 0xb64b...92dd | 0.00007362152315 |
ANDY / BOYS 1% | uniswap_v3 | 0xbde6...5b8c | 0.00006297481626 |
BRETT / ANDY 1% | uniswap_v3 | 0xa4ef...1caa | 0.00008057456149 |
WOLF / ANDY 1% | uniswap_v3 | 0xc6ae...35be | 0.0000568324780477731 |
ANDY / BOYS | uniswap_v2 | 0x9274...8318 | 0.0000697599513018422 |
ANDY / WETH 0.3% | uniswap_v3 | 0xbede...6b5d | 0.0000690238817804547 |
WOLF / ANDY 0.3% | uniswap_v3 | 0x51dd...53b2 | 0.0000552634842552384 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.