Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
imgnAI / WETH | uniswap_v2 | 0xe471...e8c4 | 0.000147883661107091 |
imgnAI / WETH 1% | uniswap_v3 | 0x4471...19c2 | 0.000234692820408823 |
imgnAI / USDC 1% | uniswap_v3 | 0xa0f3...272f | 0.01347370077818273384305324788165 |
imgnAI / WETH 0.3% | uniswap_v3 | 0x28cf...dc11 | 0.04104944444 |
TrumpBucks / imgnAI 1% | uniswap_v3 | 0xb94f...4bcd | 0.000234405116173518 |
imgnAI / ETH 1% | uniswap-v4-ethereum | 0xd0c8...454b | 0.000198682980631541 |
APE2 / imgnAI | uniswap_v2 | 0x7721...a75d | 0.000464478766946146 |
NSFW / imgnAI 1% | uniswap_v3 | 0xfae7...d45b | 0.01197144632805005602617193499024 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.