Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
XEN / WETH 1% | uniswap_v3 | 0x2a9d...98db | 0.0000000616628058212506 |
XEN / WETH | uniswap_v2 | 0xc0d7...76ae | 0.0000000617097537534328 |
XEN / VMPX 1% | uniswap_v3 | 0x54ae...e2f6 | 0.0000000608275717696666 |
XEN / DXN 1% | uniswap_v3 | 0xffdb...f825 | 0.0000000619335296331961 |
XEN / USDC 1% | uniswap_v3 | 0x353b...9e5d | 0.0000000616380868460772 |
FENIX / XEN 1% | uniswap_v3 | 0x4a8c...fd96 | 0.0000000618536507155591 |
XEN / DXN 0.3% | uniswap-v4-ethereum | 0x43b0...41a2 | 0.0000000638322954774543 |
XEN / TrumpBucks 1% | uniswap_v3 | 0xffe9...2b8c | 0.0000000629215879142285 |
XUSD / XEN 0.3% | uniswap_v3 | 0x7676...ebae | 0.000000513549731127004 |
XEN / TWIF | uniswap_v2 | 0xa308...1e3d | 0.0000000665976384972058 |
XEN / ETH 1% | uniswap-v4-ethereum | 0x69ac...9997 | 0.000000064206537342853 |
XDOGE / XEN 1% | uniswap_v3 | 0xddb9...43ab | 0.00000008084170398 |
XEN / DAI 1% | uniswap_v3 | 0xca3d...48a8 | 0.0000000662409933956895 |
XEN / XONE 1% | uniswap_v3 | 0x2396...a6e0 | 0.000000066758828650114 |
XEN / XenBurner | uniswap_v2 | 0xef47...0770 | 0.00000008597363019 |
XEN / APE2 | uniswap_v2 | 0x8deb...8a41 | 0.000000126096154015805 |
XEN / ETH 0.01% | uniswap-v4-ethereum | 0x09f4...bc4a | 0.0000000664250431643761 |
XEN / USDC | uniswap_v2 | 0xc6f6...16b4 | 0.0000000695042626725315 |
XEN / XLON 1% | uniswap_v3 | 0xc229...5915 | 0.000000922913558468952 |
XEN / WETH 0.3% | uniswap_v3 | 0x7995...19e3 | 0.00000007990217145 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.