Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
TEXAN / USDC 1% | uniswap_v3 | 0xb78a...ce35 | 0.000000250617340117706 |
HDRN / TEXAN 1% | uniswap_v3 | 0x2efa...0932 | 0.000000253732816144033 |
TEXAN / WETH 1% | uniswap_v3 | 0xb1a1...1c71 | 0.00000288616939639189 |
WPLS / TEXAN 1% | uniswap_v3 | 0x025b...ff11 | 0.00000006113116088 |
HEX / TEXAN 0.3% | uniswap_v3 | 0x26b9...f693 | 0.00000142410328433735 |
PLSX / TEXAN 1% | uniswap_v3 | 0x6098...0a03 | 0.000000737680220416749 |
TEXAN / USDC 0.3% | uniswap_v3 | 0xf5db...7455 | 0.0000571617183708911006072565520788 |
TEXAN / USDC | uniswap_v2 | 0x72d4...8225 | 0.0000000489907644606863 |
HEX / TEXAN | uniswap_v2 | 0x3eac...bf90 | 0.0000001884865767 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.