| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| HUNT / WETH 0.3% | uniswap_v3 | 0xe268...b4e2 | 0.143765466666383 |
| HUNT / USDT 0.3% | uniswap_v3 | 0x5457...8e26 | 0.144059028740615 |
| HUNT / USDC 0.004% | uniswap-v4-ethereum | 0xb493...ce39 | 0.143814065601546 |
| HUNT / ETH 0.004% | uniswap-v4-ethereum | 0xbfbd...2ee1 | 0.144103348012641 |
| HUNT / ETH 1% | uniswap-v4-ethereum | 0x74a8...d190 | 0.264885614 |
| HUNT / USDC 1% | uniswap-v4-ethereum | 0xa111...90ce | 0.2419228853 |
| PEPE / HUNT 0.3% | uniswap-v4-ethereum | 0x3bdd...f8ed | 0.2290482211 |
| HUNT / WETH | uniswap_v2 | 0xfcc9...109c | 0.165773394870663 |
| PEPE / HUNT 0.01% | uniswap_v3 | 0x0408...a75f | 0.2292361171 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.