Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
HAY / WETH 1% | uniswap_v3 | 0x7618...cc6e | 63084.6183421403 |
HAY / WETH | uniswap_v2 | 0xce40...5999 | 63325.8372147083 |
horse / HAY | uniswap_v2 | 0x5c9f...258b | 60450.3691818249 |
HAY / WETH 5% | kyberswap_elastic | 0xb0e3...a42e | 120744829676.415 |
n / HAY 1% | uniswap_v3 | 0x52aa...eb7c | 458718.166359635 |
HAY / WETH 0.3% | uniswap_v3 | 0x69ae...744e | 1343988.82285746 |
SCHAP / HAY 1% | uniswap_v3 | 0xe346...5302 | 509638.229997719 |
BMX / HAY 1% | uniswap_v3 | 0x9f8a...f1ef | 1420451.63230776 |
HAY / USDC 1% | uniswap_v3 | 0x3fa0...9267 | 283929.463484558 |
JCD / HAY 1% | uniswap_v3 | 0x76ff...1066 | 272807.203123061 |
HAY / USDT | uniswap_v2 | 0x4e65...0a48 | 982337179531901.0 |
HAY / USDC | uniswap_v2 | 0xde0e...93ef | 24895100398.2775 |
MZM / HAY 1% | uniswap_v3 | 0xf151...d8b5 | 1603895.18519261 |
HAY / WETH 0.01% | uniswap_v3 | 0x53f3...693f | 3505468.82045027 |
HAY / USDT 1% | uniswap_v3 | 0xa5d0...668f | 3531009.10531064 |
HAY / WETH 0.05% | uniswap_v3 | 0x3bcb...15b9 | 3813168.97177381 |
HAY / USDC 0.3% | uniswap_v3 | 0x8a98...8330 | 2324914.53592096 |
HAY / DAI 1% | uniswap_v3 | 0x0325...054a | 3490726.38562509 |
n / HAY 0.01% | uniswap_v3 | 0x39d1...b2db | 3883598.71072327 |
ZAPT / HAY | uniswap_v2 | 0xfe8e...74cf | 718455.483912351 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.