| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| MAXI / ETH 33% | uniswap-v4-ethereum | 0x2a03...5d8a | 0.00003470091181 |
| MAXI / WETH | uniswap_v2 | 0xe9e7...e491 | 0.00003542960978 |
| USDC / MAXI 50% | uniswap-v4-ethereum | 0x72f7...c058 | 0.0000621831957975897 |
| USDT / MAXI 33% | uniswap-v4-ethereum | 0x5775...2d5a | 0.0000635203943923211 |
| MAXI / ETH 49% | uniswap-v4-ethereum | 0xac5c...e21b | 0.00007960255985 |
| MAXI / USDT 80% | uniswap-v4-ethereum | 0x0334...4036 | 0.0000701373182 |
| MAXI / USDT 70% | uniswap-v4-ethereum | 0x64d2...dae6 | 0.00006956278281 |
| MAXI / ETH 35% | uniswap-v4-ethereum | 0xe819...2539 | 0.00005889189606 |
| MAXI / USDT 30% | uniswap-v4-ethereum | 0xfb00...2ffb | 0.00005715567924 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.