| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| MYRIA / WETH 0.3% | uniswap_v3 | 0xbf85...6b54 | 0.000129127166666388 |
| USDC / MYRIA 88% | uniswap-v4-ethereum | 0xdb52...0cc0 | 0.00010236310023104 |
| MYRIA / ETH 0.01% | uniswap-v4-ethereum | 0x14f6...b760 | 0.001125749414 |
| USDC / MYRIA 3% | uniswap-v4-ethereum | 0x4d26...ae5e | 0.001307334942 |
| MYRIA / ETH 1% | uniswap-v4-ethereum | 0x7cd7...e422 | 0.001466477973 |
| MYRIA / ETH 0.3% | uniswap-v4-ethereum | 0xcfea...35e7 | 0.0001578324531 |
| MYRIA / TITANX | uniswap_v2 | 0x8527...538d | 0.0000004260232958 |
| USDC / MYRIA 0.3% | uniswap_v3 | 0xa512...12cd | 0.001053048155 |
| USDC / MYRIA 1% | uniswap_v3 | 0x980f...6301 | 0.0009091918526 |
| USDC / MYRIA 2% | uniswap-v4-ethereum | 0x60ea...08a2 | 0.00000005771426368 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.