| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| XEN / WETH 1% | uniswap_v3 | 0x2a9d...98db | 0.00000001144498654 |
| XEN / WETH | uniswap_v2 | 0xc0d7...76ae | 0.00000001160319868 |
| XEN / DXN 2% | uniswap-v4-ethereum | 0x0042...f399 | 0.00000001098781798 |
| XEN / USDC 1% | uniswap_v3 | 0x353b...9e5d | 0.00000001072870127 |
| XEN / ETH 1% | uniswap-v4-ethereum | 0x69ac...9997 | 0.00000001123378929 |
| XEN / TrumpBucks 1% | uniswap-v4-ethereum | 0xf365...bb4e | 0.00000001086627071 |
| XEN / DXN 1% | uniswap_v3 | 0xffdb...f825 | 0.00000001166214486 |
| XEN / ETH 0.01% | uniswap-v4-ethereum | 0x09f4...bc4a | 0.0000000108088793 |
| XUSD / XEN 0.3% | uniswap_v3 | 0x7676...ebae | 0.000000513549731127004 |
| XEN / VMPX 1% | uniswap_v3 | 0x54ae...e2f6 | 0.00000001090087759 |
| XBURN / XEN | uniswap_v2 | 0x690d...3bba | 0.00000001086318971 |
| XEN / ETH 2% | uniswap-v4-ethereum | 0x4dfd...e41a | 0.0000000471361829 |
| XEN / TWIF | uniswap_v2 | 0xa308...1e3d | 0.00000001066155625 |
| XEN / WNT | uniswap_v2 | 0xbfd3...21d6 | 0.00000001034796975 |
| XEN / WNM | uniswap_v2 | 0xf488...6487 | 0.00000001018411753 |
| XEN / USDT 1% | uniswap_v3 | 0x92a0...09d8 | 0.000000310355911394498 |
| XEN / DAI 1% | uniswap_v3 | 0xca3d...48a8 | 0.0000000108269623 |
| XEL / XEN 0.3% | uniswap_v3 | 0xe5d1...bcca | 0.000000377621148003014 |
| XEN / XenBurner | uniswap_v2 | 0xef47...0770 | 0.00000001378156221 |
| XDOGE / XEN 1% | uniswap_v3 | 0xddb9...43ab | 0.00000001043176106 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.