| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| NEINEI / WETH | uniswap_v2 | 0xc4fc...6d23 | 0.00000002497771175 |
| NEINEI / WETH 1% | uniswap_v3 | 0xbf87...46a9 | 0.00000002530692792 |
| USDC / NEINEI | uniswap_v2 | 0x5814...2fb6 | 0.000000838119829456245 |
| ITO / NEINEI | uniswap_v2 | 0xc15d...9c3d | 0.00000114188477935968 |
| NFAi / NEINEI | uniswap_v2 | 0x3a55...5f6d | 0.000000672582934378432 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.