Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
XEN / WETH 1% | uniswap_v3 | 0x2a9d...98db | 0.000000026833811476618 |
XEN / WETH | uniswap_v2 | 0xc0d7...76ae | 0.0000000269090773582549 |
XEN / VMPX 1% | uniswap_v3 | 0x54ae...e2f6 | 0.0000000263247081197229 |
XEN / DXN 1% | uniswap_v3 | 0xffdb...f825 | 0.0000000262716444322902 |
XEN / ETH 1.5% | uniswap-v4-ethereum | 0x4a37...42be | 0.0000000262137847814829 |
XUSD / XEN 0.3% | uniswap_v3 | 0x7676...ebae | 0.000000513549731127004 |
XEN / ETH 1% | uniswap-v4-ethereum | 0x69ac...9997 | 0.0000000270573400580574 |
XEN / ETH 2% | uniswap-v4-ethereum | 0x4dfd...e41a | 0.0000000264939018614633 |
XEN / USDC 1% | uniswap_v3 | 0x353b...9e5d | 0.0000000267173941117794 |
XBURN / XEN | uniswap_v2 | 0x690d...3bba | 0.0000000273690530846158 |
FENIX / XEN 1% | uniswap_v3 | 0x4a8c...fd96 | 0.0000000349230726 |
XEN / TITANX 0.3% | uniswap-v4-ethereum | 0x33f2...748f | 0.00000004369826963 |
XEN / TrumpBucks 1% | uniswap_v3 | 0xffe9...2b8c | 0.0000000264769261036268 |
XEN / TWIF | uniswap_v2 | 0xa308...1e3d | 0.0000000270780107960374 |
XEN / WNM | uniswap_v2 | 0xf488...6487 | 0.0000000281208077765303 |
XEN / WNT | uniswap_v2 | 0xbfd3...21d6 | 0.000000028281558414662 |
XEN / WUNI | uniswap_v2 | 0x1139...783d | 0.00000005510228506 |
XEN / DAI 1% | uniswap_v3 | 0xca3d...48a8 | 0.0000000297030938781727 |
XEN / XONE 1% | uniswap_v3 | 0x2396...a6e0 | 0.00000004872260727 |
XEN / APE2 | uniswap_v2 | 0x8deb...8a41 | 0.00000002900856163 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.