| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| NFAi / WETH | uniswap_v2 | 0x4b05...8e49 | 0.000181013708571501 |
| NFAi / PORK | uniswap_v2 | 0xd223...0e36 | 0.000184280049319351 |
| UNI-V2 / NFAi | uniswap_v2 | 0x2ca0...ba3c | 0.0003408505271 |
| n / NFAi 0.05% | uniswap_v3 | 0x4347...c0d3 | 0.000406280745259872 |
| UNI-V2 / NFAi | uniswap_v2 | 0xddaa...7377 | 0.00037736928485036 |
| NFAi / xLEASH | uniswap_v2 | 0x018e...be86 | 0.0002695241194 |
| NFAi / DBO | uniswap_v2 | 0xae66...be25 | 0.157771045243784 |
| HODL / NFAi | uniswap_v2 | 0x97af...d5f0 | 0.170270938920229 |
| NFAi / WETH 1% | uniswap_v3 | 0xb51d...9a91 | 0.125759420496259 |
| XI / NFAi | uniswap_v2 | 0x5840...a8ad | 0.132275329689696 |
| NFAi / Gamer | uniswap_v2 | 0xf257...f3fb | 0.130000336804222 |
| y / NFAi | uniswap_v2 | 0x83f1...0bcf | 0.132152518350086 |
| NFAi / sfrxETH 1% | uniswap_v3 | 0xf16f...eda8 | 0.117490643586763 |
| NFAi / tBONE | uniswap_v2 | 0x092b...f97d | 0.116887687280414 |
| NFAi / xSHIB | uniswap_v2 | 0x9bfd...788d | 0.126559468691846 |
| NFAi / DAI 1% | uniswap_v3 | 0xb402...6eeb | 0.116732018822671 |
| NFAi / LIAR | uniswap_v2 | 0x96bb...d655 | 0.132037582507669 |
| BEAST / NFAi | uniswap_v2 | 0x9654...e7d0 | 0.132037582507669 |
| UNI-V2 / NFAi 1% | uniswap_v3 | 0xe97e...a1aa | 0.000340836297864126 |
| BNB / NFAi | uniswap_v2 | 0x919d...1bf2 | 0.132152518350086 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.