| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ANDY / WETH | uniswap_v2 | 0xa1bf...c2c0 | 0.00000923468960521652 |
| rust / ANDY 1% | uniswap-v4-ethereum | 0xc44e...b3f6 | 0.00000948527698895493 |
| ANDY / BOYS 0.3% | uniswap-v4-ethereum | 0xc278...14da | 0.0000449254395 |
| ANDY / BOYS 1% | uniswap-v4-ethereum | 0x3a4b...4e69 | 0.00003454640509 |
| ANDY / WETH 1% | uniswap_v3 | 0x2b85...284e | 0.00000956416782929077 |
| ANDY / BIRDDOG 1% | uniswap-v4-ethereum | 0x0164...2392 | 0.00003654626569 |
| ANDY / BOYS 1.5% | uniswap-v4-ethereum | 0x94fe...f916 | 0.00008984136359 |
| BRETT / ANDY 1% | uniswap-v4-ethereum | 0x060e...766e | 0.00000928243542141634 |
| $MaxETH / ANDY 1.5% | uniswap-v4-ethereum | 0x2291...d258 | 0.00003377919082 |
| BNT / ANDY | carbon-defi-ethereum | 0xc537...-521 | 0.00001465540206 |
| $MaxETH / ANDY 1% | uniswap-v4-ethereum | 0x08ca...63ca | 0.00002973139396 |
| ANDY / PEPE 1% | uniswap-v4-ethereum | 0x7f44...ecdf | 0.0000864418915 |
| $MaxETH / ANDY 1% | uniswap_v3 | 0xa24a...8ceb | 0.00000925796040504675 |
| ANDY / ETH 0.3% | uniswap-v4-ethereum | 0xb6dd...8352 | 0.00000904746970376175 |
| WOLF / ANDY 0.3% | uniswap-v4-ethereum | 0x50b6...f95a | 0.00003613028124 |
| ANDY / ETH 1% | uniswap-v4-ethereum | 0xb64b...92dd | 0.00007362152315 |
| ANDY / BOYS 1% | uniswap_v3 | 0xbde6...5b8c | 0.00006297481626 |
| BRETT / ANDY 1% | uniswap_v3 | 0xa4ef...1caa | 0.00008057456149 |
| ANDY / BOYS | uniswap_v2 | 0x9274...8318 | 0.00001428548731 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.