| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ICSA / HEX | uniswap_v2 | 0xbaaf...6b41 | 0.0301510259914847 |
| HEX / ICSA 1% | uniswap_v3 | 0x82de...ad03 | 0.0301514688258662 |
| HDRN / ICSA 1% | uniswap_v3 | 0x4676...fb07 | 0.03014131703283 |
| COM / ICSA | 9inch-ethereum | 0xaac9...07bc | 0.0301488980837465 |
| ICSA / ICSA | uniswap_v2 | 0xe811...5a42 | 0.0317106020328628 |
| ICSA / USDC 1% | uniswap_v3 | 0x3aaf...9ab7 | 0.00690109932629609 |
| ICSA / WETH | uniswap_v2 | 0x11cb...4aab | 0.00688945546756459 |
| ICSA / WETH 1% | uniswap_v3 | 0xecac...af3b | 0.02988477728 |
| HEX / ICSA 0.3% | uniswap_v3 | 0xff62...0fa5 | 0.07433296518 |
| USDC / ICSA 1% | uniswap-v4-ethereum | 0x5121...cb22 | 0.04231011066 |
| MAXI / ICSA 1% | uniswap_v3 | 0xa5f8...37e2 | 0.04939586031 |
| HDRN / ICSA | uniswap_v2 | 0xc381...7355 | 0.03015757529 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.