| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| CX / USDC 90% | uniswap-v4-ethereum | 0x23d8...b0e6 | 0.00525725959221401 |
| CX / ETH 90% | uniswap-v4-ethereum | 0xae5c...12d3 | 0.09108390196 |
| CX / USDC 59.877% | uniswap-v4-ethereum | 0x0630...8d09 | 0.006529307297 |
| CX / ETH 67% | uniswap-v4-ethereum | 0x701a...4b14 | 0.00551938561145824 |
| CX / SYN 50% | uniswap-v4-ethereum | 0x3f70...f866 | 0.006967426853 |
| CX / ETH 60% | uniswap-v4-ethereum | 0x638d...f661 | 0.02875704079 |
| CX / ETH 66% | uniswap-v4-ethereum | 0x3dc6...bd89 | 0.009485189636 |
| CX / USDC 60.07% | uniswap-v4-ethereum | 0xed94...2319 | 0.01002850892 |
| CX / USDC 59.69% | uniswap-v4-ethereum | 0x0b13...cea8 | 0.009950521903 |
| CX / ETH 64% | uniswap-v4-ethereum | 0x7aa4...2c3b | 0.006121040363 |
| CX / USDC 58.8% | uniswap-v4-ethereum | 0x6f8c...9270 | 0.006366239715 |
| CX / USDC 59.69% | uniswap-v4-ethereum | 0xb7d4...6a89 | 0.008280214555 |
| CX / ETH 70% | uniswap-v4-ethereum | 0xc40d...aae8 | 0.0225087734 |
| CX / USDC 59.88% | uniswap-v4-ethereum | 0xba76...7b61 | 0.01050366203 |
| CX / ETH 44% | uniswap-v4-ethereum | 0x833c...9626 | 0.005790109377 |
| CX / ETH 69.9% | uniswap-v4-ethereum | 0x94bc...2585 | 0.007073844639 |
| CX / ETH 69% | uniswap-v4-ethereum | 0x67d2...0bbb | 0.02239822369 |
| CX / USDC 59.728% | uniswap-v4-ethereum | 0x20c9...ffd9 | 0.007973867806 |
| CX / USDC 59.74% | uniswap-v4-ethereum | 0x929e...74c7 | 0.006124659163 |
| CX / USDC 58.812% | uniswap-v4-ethereum | 0x0d2e...2e61 | 0.005889429851 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.