| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| NFAi / WETH | uniswap_v2 | 0x4b05...8e49 | 0.00026959434115235 |
| UNI-V2 / NFAi | uniswap_v2 | 0x2ca0...ba3c | 0.0003408505271 |
| NFAi / PORK | uniswap_v2 | 0xd223...0e36 | 0.0002648384691 |
| UNI-V2 / NFAi | uniswap_v2 | 0xddaa...7377 | 0.00037736928485036 |
| NFAi / xLEASH | uniswap_v2 | 0x018e...be86 | 0.0002503701008 |
| NFAi / WETH 1% | uniswap_v3 | 0xb51d...9a91 | 0.125759420496259 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.