| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| XOR / WETH 1% | uniswap_v3 | 0x7f63...13d5 | 0.000000000000000000000000000678639122762614 |
| XOR / WETH 0.3% | uniswap_v3 | 0x9439...42c8 | 0.000000000000000000000000000683204660442106 |
| XOR / ETH 1% | uniswap-v4-ethereum | 0xef47...c7cb | 0.0000000000000000000002098919443 |
| XOR / ETH 1% | uniswap-v4-ethereum | 0xb269...b58b | 0.00000000000003120394044 |
| XOR / ETH 15% | uniswap-v4-ethereum | 0x7123...9c21 | 0.0000000000000000000002009277088 |
| XOR / USDC 48.78% | uniswap-v4-ethereum | 0xc221...3e81 | 0.0000000000000000000003331550224 |
| XOR / USDC 9.89% | uniswap-v4-ethereum | 0x05f8...de8d | 0.0000000000000000000005233139818 |
| XOR / WETH | uniswap_v2 | 0x0196...9f10 | 0.000000000000004867701351 |
| XOR / DRAGONX 1% | uniswap-v4-ethereum | 0x90c3...ffdb | 0.0000000000000000000001222059516 |
| XOR / USDC 1% | uniswap_v3 | 0xb136...0a12 | 0.00000000000000001389548841 |
| XOR / VAL 0.3% | uniswap_v3 | 0x6ad4...3f54 | 0.000000000000000000003648948878 |
| XOR / ETH 20% | uniswap-v4-ethereum | 0xa68d...503e | 0.000000000000000000000628111624 |
| XOR / USDT 1% | uniswap_v3 | 0xc049...93b0 | 0.00000000000000000000006075080006 |
| EUROC / XOR 1% | uniswap_v3 | 0xa02a...84cc | 0.000000000000002346749306 |
| XOR / TBCD 0.01% | sushiswap-v3-ethereum | 0x13dc...09b9 | 0.000000000000000000002575839904 |
| VAL / XOR | uniswap_v2 | 0x4fd3...8d76 | 0.000000004981184968 |
| XOR / WETH 1% | sushiswap-v3-ethereum | 0x1548...386d | 0.000000000000003297167596 |
| XOR / WETH | sushiswap | 0x47ff...f4e1 | 0.000000000000000000001829070306 |
| XOR / ETH 0.9% | uniswap-v4-ethereum | 0x41ee...6119 | 0.000000000000000000000002122639387 |
| XOR / ETH 0.44% | uniswap-v4-ethereum | 0x54b3...2961 | 0.000000000000000000001631707327 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.