| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| NEMO / WETH | uniswap_v2 | 0x8722...f4a8 | 0.00004880657918 |
| SKOL / NEMO | uniswap_v2 | 0xb13b...724d | 0.0000486976431103874 |
| BEARDY / NEMO 1% | uniswap_v3 | 0xd8f6...dffe | 0.0000485779802847661 |
| TAMOTSU / NEMO 1% | uniswap-v4-ethereum | 0x60ad...7bef | 0.000190503964 |
| BLSEYE🎯 / NEMO 1% | uniswap_v3 | 0x4914...95a3 | 0.0000488883999580988 |
| BEARDY / NEMO 0.01% | uniswap_v3 | 0xf51c...5317 | 0.00004448359894 |
| NEMO / MOON | uniswap_v2 | 0x1c70...158e | 0.00004729077698 |
| NEMO / FENRIR | uniswap_v2 | 0xdaa9...d1cb | 0.00004181208576 |
| BEARDY / NEMO 1% | uniswap-v4-ethereum | 0xe916...aed5 | 0.00004444384181 |
| NEMO / KŪKA 1% | uniswap-v4-ethereum | 0x6c44...8fe2 | 0.0001240044346 |
| NEMO / TREAT 1% | uniswap_v3 | 0xbf92...9e59 | 0.00004431962723 |
| IRNBNK / NEMO | uniswap_v2 | 0x8d17...5a16 | 0.0001250640752 |
| NEMO / KŪKA 0.3% | uniswap_v3 | 0xd348...286e | 0.0001269917613 |
| NEMO / WETH 1% | uniswap_v3 | 0xad23...7a0b | 0.001773215914 |
| NEMO / KŪKA 1% | uniswap_v3 | 0x2e39...7198 | 0.0001620237453 |
| BULL / NEMO 1% | uniswap_v3 | 0x346d...d2f6 | 0.0004211644078 |
| NEMO / TSUKA 1% | uniswap_v3 | 0xe2b4...87a7 | 0.00347404206233298 |
| Dream / NEMO 0.3% | uniswap_v3 | 0x5af8...9239 | 0.00261696105648762 |
| Polis / NEMO 0.3% | uniswap_v3 | 0x4936...2d8b | 0.00261696105648762 |
| NULL / NEMO | uniswap_v2 | 0xfde0...1f16 | 0.00184717676994577 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.