| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| n / WETH | uniswap_v2 | 0x5cb4...d036 | 0.0000000025957660250036 |
| SHIB / n | uniswap_v2 | 0x985d...e41d | 0.00000000259024805173071 |
| Key / n | uniswap_v2 | 0x506e...b6cf | 0.000000002377358001 |
| n / Q | uniswap_v2 | 0x5178...8e9c | 0.000000002977141744 |
| D.O.G.E / n | uniswap_v2 | 0xf99d...6085 | 0.000000002385219715 |
| n / TREAT | shibaswap | 0x8995...bbe2 | 0.00000000264745496436546 |
| null / n | uniswap_v2 | 0x6840...d825 | 0.000000003527870597 |
| NFAi / n | uniswap_v2 | 0x255b...dfce | 0.000000002385219715 |
| n / YAO | uniswap_v2 | 0xfc8c...b52b | 0.000000002516528857 |
| SHIN / n | uniswap_v2 | 0xbba9...7e48 | 0.000000002688778786 |
| AMC / n | uniswap_v2 | 0x11ef...f48d | 0.000000002335994406 |
| SHIB / n | shibaswap | 0x19cd...f58b | 0.000000003017488812 |
| MRGA / n | uniswap_v2 | 0xccfe...d7db | 0.000000002379469803 |
| wstETH / n | uniswap_v2 | 0x521d...09f6 | 0.000000002295178814 |
| n / COLON | uniswap_v2 | 0x39d0...7d70 | 0.000000003074919023 |
| BONE / n | uniswap_v2 | 0x0d03...9c3a | 0.000000002216445333 |
| JJ / n | uniswap_v2 | 0x06b7...7787 | 0.000000002379469803 |
| n / PEPEV2 | uniswap_v2 | 0xa555...409b | 0.000000003552369727 |
| MAGAKX / n | uniswap_v2 | 0xa04d...b664 | 0.000000004111400238 |
| BIAO / n 1% | uniswap_v3 | 0x1d1f...6de2 | 0.000000002216485716 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.