| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| imgnAI / WETH | uniswap_v2 | 0xe471...e8c4 | 0.0000809653766566298 |
| imgnAI / USDT 20% | uniswap-v4-ethereum | 0xaf46...6bc0 | 0.0000851583755966916 |
| imgnAI / WETH 1% | uniswap_v3 | 0x4471...19c2 | 0.0000697755452842625 |
| imgnAI / ETH 1% | uniswap-v4-ethereum | 0xd0c8...454b | 0.0000943768731845833 |
| TrumpBucks / imgnAI 1% | uniswap_v3 | 0xb94f...4bcd | 0.000111150899047089 |
| imgnAI / USDT 30% | uniswap-v4-ethereum | 0xb1b0...3a79 | 0.0002409341169 |
| imgnAI / USDT 50% | uniswap-v4-ethereum | 0xd38b...f9ca | 0.00005416120173 |
| imgnAI / WETH 0.3% | uniswap_v3 | 0x28cf...dc11 | 0.04104944444 |
| APE2 / imgnAI | uniswap_v2 | 0x7721...a75d | 0.0001172765373 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.