Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
NFAi / WETH | uniswap_v2 | 0x4b05...8e49 | 0.0001693746764 |
NFAi / WETH 1% | uniswap_v3 | 0xb51d...9a91 | 0.125759420496259 |
UNI-V2 / NFAi | uniswap_v2 | 0x2ca0...ba3c | 0.0001688935762 |
NFAi / PORK | uniswap_v2 | 0xd223...0e36 | 0.0001688935762 |
n / NFAi 0.05% | uniswap_v3 | 0x4347...c0d3 | 0.000406280745259872 |
NFAi / xLEASH | uniswap_v2 | 0x018e...be86 | 0.000284244817660655 |
NFAi / DBO | uniswap_v2 | 0xae66...be25 | 0.157771045243784 |
HODL / NFAi | uniswap_v2 | 0x97af...d5f0 | 0.170270938920229 |
XI / NFAi | uniswap_v2 | 0x5840...a8ad | 0.132275329689696 |
NFAi / Gamer | uniswap_v2 | 0xf257...f3fb | 0.130000336804222 |
y / NFAi | uniswap_v2 | 0x83f1...0bcf | 0.132152518350086 |
NFAi / sfrxETH 1% | uniswap_v3 | 0xf16f...eda8 | 0.117490643586763 |
NFAi / tBONE | uniswap_v2 | 0x092b...f97d | 0.116887687280414 |
NFAi / xSHIB | uniswap_v2 | 0x9bfd...788d | 0.126559468691846 |
NFAi / DAI 1% | uniswap_v3 | 0xb402...6eeb | 0.116732018822671 |
NFAi / LIAR | uniswap_v2 | 0x96bb...d655 | 0.132037582507669 |
BEAST / NFAi | uniswap_v2 | 0x9654...e7d0 | 0.132037582507669 |
UNI-V2 / NFAi 1% | uniswap_v3 | 0xe97e...a1aa | 0.000340836297864126 |
BNB / NFAi | uniswap_v2 | 0x919d...1bf2 | 0.132152518350086 |
wNuni / NFAi 1% | uniswap_v3 | 0xf106...9fb1 | 0.000461715732557305 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.