| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| NEIRO / WETH | uniswap_v2 | 0x3885...62a3 | 0.00114319153468627 |
| NEIRO / WETH 0.3% | uniswap_v3 | 0xfa45...3d91 | 0.006402622666 |
| NEIRO / ETH 20% | uniswap-v4-ethereum | 0x8e03...040c | 0.007918166287 |
| NEIRO / ETH 70% | uniswap-v4-ethereum | 0xcdbb...d8f9 | 0.0006135360603 |
| NEIRO / WETH 1% | uniswap_v3 | 0x9073...29b1 | 0.001007230501 |
| NEIRO / ETH 0.3% | uniswap-v4-ethereum | 0x82fe...e522 | 0.1182085421 |
| USDT / NEIRO 88% | uniswap-v4-ethereum | 0x7844...dfee | 0.0005986623334 |
| EVRDOG / NEIRO 1% | uniswap_v3 | 0x3faf...eb9e | 0.0188266099 |
| ZIK / NEIRO 1% | uniswap_v3 | 0x11e9...4d41 | 0.01706202092 |
| NEIRO / WETH | sushiswap | 0xf6fa...d547 | 0.008713298477 |
| Neiro / NEIRO | uniswap_v2 | 0xbadc...9b29 | 0.09864656948 |
| KABOSU / NEIRO | uniswap_v2 | 0x30ad...667a | 0.01796035568 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.