| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| n / WETH | uniswap_v2 | 0x5cb4...d036 | 0.000000002241725763 |
| SHIB / n | uniswap_v2 | 0x985d...e41d | 0.00000000229253648 |
| NFAi / n | uniswap_v2 | 0x255b...dfce | 0.000000002331857258 |
| Key / n | uniswap_v2 | 0x506e...b6cf | 0.00000000234487766 |
| n / TREAT | shibaswap | 0x8995...bbe2 | 0.000000002237464541 |
| D.O.G.E / n | uniswap_v2 | 0xf99d...6085 | 0.000000002337431638 |
| n / Q | uniswap_v2 | 0x5178...8e9c | 0.00000000234487766 |
| null / n | uniswap_v2 | 0x6840...d825 | 0.000000003527870597 |
| n / YAO | uniswap_v2 | 0xfc8c...b52b | 0.00000000232493025 |
| AMC / n | uniswap_v2 | 0x11ef...f48d | 0.000000002334246361 |
| MRGA / n | uniswap_v2 | 0xccfe...d7db | 0.000000002334246361 |
| wstETH / n | uniswap_v2 | 0x521d...09f6 | 0.000000001947900961 |
| SHIN / n | uniswap_v2 | 0xbba9...7e48 | 0.000000002334246361 |
| POTATO / n | uniswap_v2 | 0xe9ba...6209 | 0.00000029640968559809 |
| n / COLON | uniswap_v2 | 0x39d0...7d70 | 0.000000002331745219 |
| n / 𝑴𝒂𝒕𝒕 𝑭𝒖𝒓𝒊𝒆 VS 𝐴𝑛𝑑𝑟𝑒𝑤 𝑇𝑎𝑡𝑒 | uniswap_v2 | 0x9c68...1a56 | 0.000000156494156801439 |
| SHIB / n | shibaswap | 0x19cd...f58b | 0.000000002325989686 |
| BONE / n | uniswap_v2 | 0x0d03...9c3a | 0.000000002331857258 |
| JJ / n | uniswap_v2 | 0x06b7...7787 | 0.00000000234487766 |
| n / PEPEV2 | uniswap_v2 | 0xa555...409b | 0.000000003552369727 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.