| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| XYO / ETHMNY 1% | uniswap_v3 | 0xe37a...1dc4 | 0.00000655269513152061 |
| XYO / ETHMNY 1% | uniswap-v4-ethereum | 0xcf94...3bdf | 0.00000651312756921237 |
| ETHMNY / WETH | sushiswap | 0x5a45...ccab | 0.00000652666739761971 |
| ETHMNY / UNI 1% | uniswap_v3 | 0xef01...2a92 | 0.0000064579331671293 |
| MANA / ETHMNY | sushiswap | 0x77fb...b5ba | 0.00000647160508210354 |
| ETHMNY / UNI 1% | sushiswap-v3-ethereum | 0xdc9b...592d | 0.00000638043144990003 |
| ETHMNY / ERC223 | uniswap_v2 | 0xa3c5...cefe | 0.000006332392562 |
| ETHMNY / YFI | sushiswap | 0x6a3b...5076 | 0.00000653457896533204 |
| UNI / ETHMNY | uniswap_v2 | 0x897f...dba8 | 0.000006517562604 |
| ETHMNY / ERC223 | sushiswap | 0x8488...be1a | 0.000007271216405 |
| XYO / ETHMNY | sushiswap | 0xd576...b23f | 0.00000683043284061764 |
| IRC / ETHMNY | uniswap_v2 | 0x68ff...4ee1 | 0.000006710319056 |
| ETHMNY / cUSDC | uniswap_v2 | 0xc6b1...2318 | 0.00000650651588818763 |
| cUNI / ETHMNY | uniswap_v2 | 0x6a2d...325f | 0.000006991988415 |
| 1INCH / ETHMNY 1% | uniswap_v3 | 0xf34e...0608 | 0.00000669312155756561 |
| CRO / ETHMNY 1% | sushiswap-v3-ethereum | 0xdf97...6160 | 0.000008121156871 |
| CRO / ETHMNY | uniswap_v2 | 0x7519...6be3 | 0.000006772628309 |
| ETHMNY / USDT | sushiswap | 0xf960...b892 | 0.00000661596195235604 |
| ETHMNY / WETH 1% | uniswap_v3 | 0x4cb7...286f | 0.000007373449434 |
| XYO / ETHMNY 3% | balancer_ethereum | 0x0cda...f709 | 0.00000679913287046716 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.