| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| INF / USDT 50% | uniswap-v4-ethereum | 0x820f...45d0 | 0.0000566297602 |
| INF / ETH 1% | uniswap-v4-ethereum | 0x1c64...bf38 | 0.00005038225784 |
| INF / USDT 39% | uniswap-v4-ethereum | 0x903e...1a4e | 0.00004710684479 |
| INF / USDC 50% | uniswap-v4-ethereum | 0x2204...6461 | 0.001133255952 |
| USDC / INF 1% | uniswap_v3 | 0x1b93...1228 | 0.0007786389611 |
| INF / WETH 0.3% | uniswap_v3 | 0x7a6a...e7ba | 0.0003191899549 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.