| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| HAY / WETH 1% | uniswap_v3 | 0x7618...cc6e | 59489.4254680942 |
| HAY / WETH | uniswap_v2 | 0xce40...5999 | 60925.0788111966 |
| HAY / USDC 1% | uniswap_v3 | 0x3fa0...9267 | 63068.967264958 |
| USDC / HAY 8% | uniswap-v4-ethereum | 0x6def...ea8e | 68446.5427414318 |
| HAY / ETH 0.3% | uniswap-v4-ethereum | 0xd1e3...c27e | 92630.8117994067 |
| horse / HAY | uniswap_v2 | 0x5c9f...258b | 59407.8712729675 |
| USDC / HAY 7.5% | uniswap-v4-ethereum | 0xafef...d552 | 249130.504090915 |
| HAY / ETH 2.5% | uniswap-v4-ethereum | 0x70da...151e | 111767.910622025 |
| HAY / USDC | uniswap_v2 | 0xde0e...93ef | 24895100398.2775 |
| KABOSU / HAY | uniswap_v2 | 0x006e...6cb5 | 66804.8147535528 |
| DOGE2.0 / HAY | uniswap_v2 | 0xf27b...d20d | 51474.6411861287 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.