Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
X2Y2 / WETH | uniswap_v2 | 0x6033...7d8d | 0.00106367731639999 |
X2Y2 / WETH 1% | uniswap_v3 | 0x6380...32e3 | 0.003255965939 |
X2Y2 / USDT 1% | uniswap_v3 | 0x50b4...d8ae | 0.0726376349109216385102244808438 |
X2Y2 / USDC 1% | uniswap_v3 | 0x9a19...0db2 | 0.0328775263763216 |
X2Y2 / WETH 0.3% | uniswap_v3 | 0x52cf...4c04 | 0.0118918369026194 |
X2Y2 / USDC | uniswap_v2 | 0x0550...450e | 0.0401448835249113230814336677139710685788082032087323779125848831039311275356991762106496005 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.