| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| wNXM / WETH 0.3% | uniswap_v3 | 0xc02d...0139 | 81.0044649583082 |
| wNXM / WETH | uniswap_v2 | 0x23bf...fd27 | 80.7213609070254 |
| wNXM / WETH | sushiswap | 0xfcff...7fcb | 79.231817616001 |
| wNXM / ETH 0.555% | uniswap-v4-ethereum | 0x6477...451c | 75.725802515304 |
| wNXM / ICHI 0.3% | uniswap_v3 | 0x0002...0352 | 80.9574936838215 |
| wNXM / WETH 1% | uniswap_v3 | 0x058d...d3c0 | 75.0463752867 |
| wNXM / ETH 0.3% | uniswap-v4-ethereum | 0xfb01...d26d | 95.9613151432 |
| wNXM / ETH 1% | uniswap-v4-ethereum | 0x4df8...5b49 | 75.8988401882312 |
| wNXM / ETH 0.2% | uniswap-v4-ethereum | 0x6e99...38d3 | 76.2616634970847 |
| wNXM / ETH 1.1% | uniswap-v4-ethereum | 0xbb8f...6670 | 74.3400094835 |
| wNXM / ETH 2% | uniswap-v4-ethereum | 0x0ade...bd89 | 74.1475963564 |
| wNXM / ICHI 0.3% | uniswap_v3 | 0x9646...481d | 73.4008410355 |
| wNXM / arNXM | uniswap_v2 | 0x3698...5af2 | 77.5943048096693 |
| wNXM / USDC 0.3% | uniswap-v4-ethereum | 0xa349...d8a0 | 58.8670824509 |
| wNXM / ETH 2.6% | uniswap-v4-ethereum | 0x847b...2bee | 103.5274265969 |
| wNXM / ETH 0.8% | uniswap-v4-ethereum | 0x823c...ff47 | 79.1877045822 |
| wNXM / USDC | sushiswap | 0xac7b...d52d | 78.6976482132224 |
| wNXM / ETH 3.3% | uniswap-v4-ethereum | 0xbe6f...ea12 | 75.7849854912 |
| wNXM / arNXM | sushiswap | 0xc7dc...aeac | 68.1557944921 |
| wNXM / ETH 5% | uniswap-v4-ethereum | 0x2d33...400b | 70.2494432185 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.