| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| NCT / WETH | uniswap_v2 | 0xb154...81b3 | 0.00991398442395975 |
| NCT / ETH 50% | uniswap-v4-ethereum | 0xdf06...8871 | 0.008000841244 |
| NCT / USDC 16% | uniswap-v4-ethereum | 0xaf4b...2d9c | 0.01041906367 |
| NCT / USDT 11.9% | uniswap-v4-ethereum | 0xc6b4...ddb6 | 0.01191062868 |
| NCT / ETH 1% | uniswap-v4-ethereum | 0x2f77...2f41 | 0.01882544571 |
| NCT / WETH 1% | uniswap_v3 | 0x05aa...5018 | 0.009822011655 |
| NCT / ETH 4% | uniswap-v4-ethereum | 0x4465...a2a9 | 0.02047781141 |
| NCT / ETH 15% | uniswap-v4-ethereum | 0x712d...8341 | 0.009548664175 |
| NCT / USDC 15% | uniswap-v4-ethereum | 0x2ec3...1f89 | 0.01303437496 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.