| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| WXRP / WETH 1% | uniswap_v3 | 0x27db...cf76 | 1.4751132911 |
| WXRP / ETH 1% | uniswap-v4-ethereum | 0x8272...dd3f | 1.4680461728 |
| WXRP / WETH | sushiswap | 0xa7a8...f918 | 1.4649653856 |
| WXRP / USDC | sushiswap | 0xea9b...3f34 | 1.4717913669 |
| LAWAS / WXRP 0.01% | pancakeswap-v3-ethereum | 0xaabc...2416 | 1.43996957120414 |
| WXRP / USDT 1% | uniswap-v4-ethereum | 0xcfe5...16a8 | 1.7815617049 |
| WXRP / USDT 10% | uniswap-v4-ethereum | 0x199e...07cb | 1.6858179673 |
| WXRP / ZIK 1% | uniswap-v4-ethereum | 0x77ec...4807 | 1.3959629852 |
| WXRP / ONDO 0.3% | uniswap-v4-ethereum | 0x5051...6ce8 | 2.3153523261 |
| WXRP / VVV | uniswap_v2 | 0x5142...2cf6 | 1.378566434 |
| LAWAS / WXRP 0.01% | sushiswap-v3-ethereum | 0xf39c...b3fd | 1.43350177477497 |
| WXRP / USDT 4.6% | uniswap-v4-ethereum | 0x7ca8...b041 | 2.4732185098 |
| WXRP / ETH 10% | uniswap-v4-ethereum | 0x4e80...1189 | 1.4287378873 |
| LAWAS / WXRP 0.05% | sushiswap-v3-ethereum | 0xd8df...2c23 | 1.42134495718987 |
| WXRP / HYDX 0.3% | uniswap_v3 | 0x410a...c4b9 | 1.4674325366 |
| IYKYK / WXRP | uniswap_v2 | 0x344d...5c71 | 1.3414598341 |
| YELLOW / WXRP 1.25% | uniswap-v4-ethereum | 0x3392...a0b2 | 1.38233126655486 |
| WXRP / USDC 0.3% | uniswap-v4-ethereum | 0xb6b1...64af | 2.369146419 |
| WXRP / WETH | x7-finance | 0x799c...69cf | 1.3781214375 |
| HYBX / WXRP 0.3% | uniswap_v3 | 0xd848...a74a | 2.4196771711 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.