Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
XEN / WETH 1% | uniswap_v3 | 0x2a9d...98db | 0.0000000295921279277565 |
XEN / WETH | uniswap_v2 | 0xc0d7...76ae | 0.0000000297856386050466 |
XEN / ETH 1% | uniswap-v4-ethereum | 0x69ac...9997 | 0.000000029616832632084 |
XEN / VMPX 1% | uniswap_v3 | 0x54ae...e2f6 | 0.0000000297232816247695 |
XBURN / XEN | uniswap_v2 | 0x690d...3bba | 0.0000000297108961777012 |
XEN / XBURN 1% | uniswap-v4-ethereum | 0xdffa...e1f4 | 0.0000000296875866178651 |
XEN / ETH 0.01% | uniswap-v4-ethereum | 0x09f4...bc4a | 0.0000000305056207376815 |
XEN / WETH 0.3% | uniswap_v3 | 0x7995...19e3 | 0.0000000708171177112233 |
XUSD / XEN 0.3% | uniswap_v3 | 0x7676...ebae | 0.000000513549731127004 |
XEN / USDC 1% | uniswap_v3 | 0x353b...9e5d | 0.0000000295365356562519 |
XEN / TITANX 0.3% | uniswap-v4-ethereum | 0x33f2...748f | 0.00000004369826963 |
FENIX / XEN 1% | uniswap_v3 | 0x4a8c...fd96 | 0.00000002492867236 |
XEN / ETH 2% | uniswap-v4-ethereum | 0x4dfd...e41a | 0.0000000471361829 |
XEN / TrumpBucks 1% | uniswap_v3 | 0xffe9...2b8c | 0.0000000285236506463511 |
XEN / TWIF | uniswap_v2 | 0xa308...1e3d | 0.0000000299605912201974 |
XEN / WUNI | uniswap_v2 | 0x1139...783d | 0.00000005510228506 |
XEN / WNM | uniswap_v2 | 0xf488...6487 | 0.00000002951561145 |
XEN / WNT | uniswap_v2 | 0xbfd3...21d6 | 0.00000003166748613 |
XDOGE / XEN 1% | uniswap_v3 | 0xddb9...43ab | 0.00000003136907836 |
XEN / USDT 1% | uniswap_v3 | 0x92a0...09d8 | 0.000000310355911394498 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.