| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| HOODon / USDC 28% | uniswap-v4-ethereum | 0x8787...d5a7 | 156.84377342059 |
| HOODon / USDC 1% | uniswap_v3 | 0x6c56...3b27 | 124.426483452821 |
| HOODon / USDT 80% | uniswap-v4-ethereum | 0x8e96...b47c | 66.6198652071 |
| HOODon / USDC 70% | uniswap-v4-ethereum | 0x542a...5bd4 | 78.0894611573 |
| HOODon / USDC 90% | uniswap-v4-ethereum | 0xca7e...72cf | 78.06587181 |
| HOODon / USDC 29% | uniswap-v4-ethereum | 0xa855...4e93 | 138.393742039 |
| HOODon / USDT 40% | uniswap-v4-ethereum | 0xea8e...d370 | 78.1408686374 |
| HOODon / ETH 48% | uniswap-v4-ethereum | 0xa6c0...c82a | 240.5233266016 |
| HOODon / USDT 88% | uniswap-v4-ethereum | 0x64d1...fa57 | 1095.8250614017 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.