| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| WXT / USDT 40% | uniswap-v4-ethereum | 0xc909...95d0 | 0.02720828756 |
| WXT / USDT 99.97% | uniswap-v4-ethereum | 0x9129...6fdd | 0.01006033074 |
| WXT / USDT 35% | uniswap-v4-ethereum | 0xad37...9003 | 0.01384795195 |
| WXT / USDC 95.71% | uniswap-v4-ethereum | 0x3b9f...5467 | 0.0111830271 |
| WXT / USDT 99.6% | uniswap-v4-ethereum | 0x988f...0e60 | 0.0116004158 |
| WXT / ETH 96% | uniswap-v4-ethereum | 0xfbb2...70e4 | 243.2736109067 |
| WXT / USDT 99.903% | uniswap-v4-ethereum | 0xaf89...d2dc | 0.01139809373 |
| WXT / ETH 75% | uniswap-v4-ethereum | 0xa712...e2be | 0.0113670871 |
| WXT / ETH 99.994% | uniswap-v4-ethereum | 0x0abb...f198 | 0.005732522573 |
| WXT / USDT 99.992% | uniswap-v4-ethereum | 0x4468...77d0 | 0.006410501399 |
| WXT / ETH 15% | uniswap-v4-ethereum | 0xd062...3034 | 0.03254704645 |
| WXT / USDT 99.911% | uniswap-v4-ethereum | 0x3d6e...3fab | 380.4500057033 |
| WXT / ETH 99% | uniswap-v4-ethereum | 0xfc91...70f9 | 0.06457025268 |
| WXT / USDT 99.92% | uniswap-v4-ethereum | 0x1491...2d0e | 10806.0836885131 |
| WXT / ETH 80% | uniswap-v4-ethereum | 0x2b48...8877 | 0.2230942188 |
| WXT / ETH 10% | uniswap-v4-ethereum | 0x008a...9d9a | 0.0195880434 |
| WXT / USDT 99.903% | uniswap-v4-ethereum | 0x546b...b143 | 0.01139766079 |
| WXT / USDT 70% | uniswap-v4-ethereum | 0xfa4f...9fc9 | 0.03913004743 |
| WXT / ETH 94% | uniswap-v4-ethereum | 0xd1ef...fc19 | 0.00575930655 |
| WXT / ETH 95% | uniswap-v4-ethereum | 0x249a...09f8 | 228051510.391783 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.