Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
NCT / WETH | uniswap_v2 | 0xb154...81b3 | 0.0210637801838582 |
NCT / WETH 1% | uniswap_v3 | 0x05aa...5018 | 0.0209369381171858 |
NCT / ETH 50% | uniswap-v4-ethereum | 0xdf06...8871 | 0.01165142991 |
NCT / ETH 1% | uniswap-v4-ethereum | 0x2f77...2f41 | 0.01882544571 |
NCT / ETH 15% | uniswap-v4-ethereum | 0x712d...8341 | 0.0180056372427232 |
NCT / ETH 4% | uniswap-v4-ethereum | 0x4465...a2a9 | 0.02047781141 |
NCT / USDC 1% | uniswap_v3 | 0xd73f...5e03 | 0.00891256925328006066001924954752 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.