| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| wNXM / WETH 0.3% | uniswap_v3 | 0xc02d...0139 | 60.0796773142 |
| wNXM / WETH | uniswap_v2 | 0x23bf...fd27 | 60.2991217793 |
| wNXM / WETH | sushiswap | 0xfcff...7fcb | 60.1240764458 |
| stNXM / wNXM 0.05% | uniswap_v3 | 0xfd5b...2fbc | 51.5634104544 |
| wNXM / ETH 0.555% | uniswap-v4-ethereum | 0x6477...451c | 66.1108894856 |
| wNXM / ICHI 0.3% | uniswap_v3 | 0x0002...0352 | 60.737283817 |
| wNXM / WETH 1% | uniswap_v3 | 0x058d...d3c0 | 58.8109533084 |
| wNXM / ETH 0.3% | uniswap-v4-ethereum | 0xfb01...d26d | 95.9613151432 |
| wNXM / ETH 1% | uniswap-v4-ethereum | 0x4df8...5b49 | 56.4923960367 |
| wNXM / ETH 0.2% | uniswap-v4-ethereum | 0x6e99...38d3 | 52.0048169849 |
| wNXM / ETH 1.1% | uniswap-v4-ethereum | 0xbb8f...6670 | 65.4222691279 |
| wNXM / ETH 2% | uniswap-v4-ethereum | 0x0ade...bd89 | 74.1475963564 |
| wNXM / ICHI 0.3% | uniswap_v3 | 0x9646...481d | 53.9314874683 |
| wNXM / arNXM | uniswap_v2 | 0x3698...5af2 | 56.8954643295 |
| wNXM / USDC 0.3% | uniswap-v4-ethereum | 0xa349...d8a0 | 58.8670824509 |
| wNXM / ETH 2.6% | uniswap-v4-ethereum | 0x847b...2bee | 103.5274265969 |
| wNXM / ETH 0.8% | uniswap-v4-ethereum | 0x823c...ff47 | 79.1877045822 |
| wNXM / USDC | sushiswap | 0xac7b...d52d | 59.7251826538 |
| wNXM / wstETH 0.3% | uniswap-v4-ethereum | 0x369e...c86f | 53.2530105918 |
| UNBNK / wNXM 1% | uniswap_v3 | 0x637a...b841 | 27.7386638401083 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.