| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| MSN / USDT 49% | uniswap-v4-ethereum | 0x7348...babf | 0.001507706887 |
| MSN / USDT 20% | uniswap-v4-ethereum | 0x2061...ee07 | 0.002425731554 |
| MSN / ETH 69% | uniswap-v4-ethereum | 0x7342...24ac | 0.0003908943352 |
| MSN / USDT 50% | uniswap-v4-ethereum | 0xb98b...a78a | 0.006024864845 |
| MSN / ETH 90.95% | uniswap-v4-ethereum | 0x995d...1c85 | 0.008697934536 |
| MSN / ETH 73% | uniswap-v4-ethereum | 0x9973...6d46 | 0.007203435596 |
| MSN / USDT 90% | uniswap-v4-ethereum | 0x2961...94fa | 0.0003183091129 |
| MSN / USDC 1% | uniswap_v3 | 0xbcc9...0c2f | 0.001802961669 |
| MSN / ETH 70% | uniswap-v4-ethereum | 0xba56...5ce6 | 0.002102827989 |
| MSN / USDT 0.3% | uniswap_v3 | 0xa534...48af | 2.42065215208763 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.