Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
OXT / WETH | uniswap_v2 | 0x9b53...312d | 0.0531847397810554 |
OXT / STORJ | shibaswap | 0x66cb...b349 | 0.07481134046 |
OXT / WETH 1% | uniswap_v3 | 0x820e...eb31 | 0.095026815783116 |
OXT / MANA | sushiswap | 0x9d16...e869 | 0.117686781115465 |
OXT / WETH | sushiswap | 0xf640...de29 | 0.06047862192 |
OXT / KABOSU | uniswap_v2 | 0x2800...68e5 | 0.07961889762 |
OXT / UNI | uniswap_v2 | 0xb359...483c | 0.071312016735499906144 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.