| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ETHMNY / WETH | sushiswap | 0x5a45...ccab | 0.000004555628876 |
| ETHMNY / YFI | sushiswap | 0x6a3b...5076 | 0.000004458644998 |
| MNTP / ETHMNY | sushiswap | 0x87f5...51ab | 0.00000455691616929837 |
| XYO / ETHMNY 1% | uniswap_v3 | 0xe37a...1dc4 | 0.00000455605855706462 |
| ETHMNY / ERC223 | uniswap_v2 | 0xa3c5...cefe | 0.000005234933918 |
| ETHMNY / UNI 1% | uniswap_v3 | 0xef01...2a92 | 0.000004788117215 |
| 1INCH / ETHMNY 1% | kyberswap_elastic | 0x7b97...59e6 | 0.000025514337687623477175729986202484509070095119753354576 |
| UNI / ETHMNY | uniswap_v2 | 0x897f...dba8 | 0.000004984165643 |
| ETHMNY / ERC223 | sushiswap | 0x8488...be1a | 0.000004808502294 |
| ETHMNY / cUSDC | uniswap_v2 | 0xc6b1...2318 | 0.00000461018338 |
| ETHMNY / UNI 1% | sushiswap-v3-ethereum | 0xdc9b...592d | 0.00000496288353 |
| XYO / ETHMNY | sushiswap | 0xd576...b23f | 0.00000478561829628466 |
| IRC / ETHMNY | uniswap_v2 | 0x68ff...4ee1 | 0.000006710319056 |
| cUNI / ETHMNY | uniswap_v2 | 0x6a2d...325f | 0.000005196484156 |
| 1INCH / ETHMNY 1% | uniswap_v3 | 0xf34e...0608 | 0.00000456742089646186 |
| ETHMNY / USDT | sushiswap | 0xf960...b892 | 0.000004572165781 |
| CRO / ETHMNY | uniswap_v2 | 0x7519...6be3 | 0.000004829251204 |
| CRO / ETHMNY 1% | sushiswap-v3-ethereum | 0xdf97...6160 | 0.000008121156871 |
| ETHMNY / WETH 1% | uniswap_v3 | 0x4cb7...286f | 0.000005345524258 |
| XYO / ETHMNY 3% | balancer_ethereum | 0x0cda...f709 | 0.000005322243307 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.