| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| wNXM / WETH 0.3% | uniswap_v3 | 0xc02d...0139 | 51.7280655266478 |
| wNXM / WETH | uniswap_v2 | 0x23bf...fd27 | 51.7507213648352 |
| wNXM / wstETH 0.3% | uniswap-v4-ethereum | 0x369e...c86f | 51.5993799517236 |
| wNXM / ETH 1% | uniswap-v4-ethereum | 0x4df8...5b49 | 52.310218276046 |
| wNXM / USDC | sushiswap | 0xac7b...d52d | 51.9955957719016 |
| wNXM / WETH | sushiswap | 0xfcff...7fcb | 53.0502319694213 |
| stNXM / wNXM 0.05% | uniswap_v3 | 0xfd5b...2fbc | 53.6037536117 |
| wNXM / ETH 0.555% | uniswap-v4-ethereum | 0x6477...451c | 66.1108894856 |
| wNXM / ICHI 0.3% | uniswap_v3 | 0x0002...0352 | 53.1064716388036 |
| wNXM / WETH 1% | uniswap_v3 | 0x058d...d3c0 | 48.2982919892 |
| wNXM / ETH 0.3% | uniswap-v4-ethereum | 0xfb01...d26d | 95.9613151432 |
| wNXM / ETH 0.2% | uniswap-v4-ethereum | 0x6e99...38d3 | 65.193433147 |
| wNXM / ETH 1.1% | uniswap-v4-ethereum | 0xbb8f...6670 | 65.4222691279 |
| wNXM / ETH 2% | uniswap-v4-ethereum | 0x0ade...bd89 | 74.1475963564 |
| wNXM / ICHI 0.3% | uniswap_v3 | 0x9646...481d | 52.3016102482 |
| wNXM / arNXM | uniswap_v2 | 0x3698...5af2 | 53.221753134 |
| wNXM / USDC 0.3% | uniswap-v4-ethereum | 0xa349...d8a0 | 58.8670824509 |
| wNXM / ETH 2.6% | uniswap-v4-ethereum | 0x847b...2bee | 103.5274265969 |
| wNXM / ETH 0.8% | uniswap-v4-ethereum | 0x823c...ff47 | 79.1877045822 |
| UNBNK / wNXM 1% | uniswap_v3 | 0x637a...b841 | 27.7386638401083 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.