| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| HAY / WETH 1% | uniswap_v3 | 0x7618...cc6e | 46784.8689975357 |
| USDC / HAY 20% | uniswap-v4-ethereum | 0xd3c1...72cf | 54122.5578267605 |
| USDC / HAY 8% | uniswap-v4-ethereum | 0x6def...ea8e | 71148.8753819692 |
| HAY / WETH | uniswap_v2 | 0xce40...5999 | 50207.3322272883 |
| HAY / ETH 0.3% | uniswap-v4-ethereum | 0xd1e3...c27e | 47406.5542868603 |
| HAY / USDC 1% | uniswap_v3 | 0x3fa0...9267 | 49048.9154908879 |
| horse / HAY | uniswap_v2 | 0x5c9f...258b | 48305.9572462349 |
| HAY / WETH 5% | kyberswap_elastic | 0xb0e3...a42e | 120744829676.415 |
| n / HAY 1% | uniswap_v3 | 0x52aa...eb7c | 458718.166359635 |
| HAY / WETH 0.3% | uniswap_v3 | 0x69ae...744e | 1343988.82285746 |
| USDC / HAY 7.5% | uniswap-v4-ethereum | 0xafef...d552 | 63377.7049451605 |
| SCHAP / HAY 1% | uniswap_v3 | 0xe346...5302 | 509638.229997719 |
| BMX / HAY 1% | uniswap_v3 | 0x9f8a...f1ef | 1420451.63230776 |
| HAY / ETH 2.5% | uniswap-v4-ethereum | 0x70da...151e | 111767.910622025 |
| JCD / HAY 1% | uniswap_v3 | 0x76ff...1066 | 272807.203123061 |
| HAY / USDT | uniswap_v2 | 0x4e65...0a48 | 982337179531901.0 |
| MZM / HAY 1% | uniswap_v3 | 0xf151...d8b5 | 1603895.18519261 |
| HAY / WETH 0.01% | uniswap_v3 | 0x53f3...693f | 3505468.82045027 |
| HAY / USDT 1% | uniswap_v3 | 0xa5d0...668f | 3531009.10531064 |
| HAY / WETH 0.05% | uniswap_v3 | 0x3bcb...15b9 | 3813168.97177381 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.