| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| TRX / USDC | uniswap_v2 | 0x9a84...2b41 | 0.298838547687757 |
| HTX / TRX | uniswap_v2 | 0xaca1...c98d | 0.296225560449304 |
| TRX / WETH 0.05% | uniswap_v3 | 0x9995...dcb0 | 0.297316218706638 |
| TRX / ZIK 1% | uniswap-v4-ethereum | 0xa937...ffcd | 0.296440767778191 |
| TRX / ETH 0.3% | uniswap-v4-ethereum | 0x24b7...134d | 0.297505751824716 |
| TRX / ELON 0.3% | uniswap-v4-ethereum | 0x8012...16d0 | 0.299060550301042 |
| TRX / ShibDoge | uniswap_v2 | 0x668b...8421 | 0.320029451058227 |
| TRX / SHPING 0.3% | uniswap-v4-ethereum | 0xd48e...fef9 | 0.317599925567452 |
| TRX / ABDS 0.3% | uniswap-v4-ethereum | 0x87ff...b8de | 0.2791647023 |
| TRX / ENA 1% | uniswap-v4-ethereum | 0xd72c...bb0c | 0.2881705668 |
| HYBX / TRX 0.3% | uniswap_v3 | 0x2aa2...bb47 | 0.2250052144 |
| TRX / WETH 0.3% | uniswap_v3 | 0x4396...3c28 | 0.4695582222 |
| TRX / USDT 0.25% | pancakeswap-v3-ethereum | 0xd807...41b9 | 0.3116615442 |
| TRX / TOM3 0.3% | uniswap-v4-ethereum | 0xc158...512e | 0.2298392593 |
| TRX / USDC 0.01% | uniswap-v4-ethereum | 0xac8f...7279 | 0.3168812878 |
| TRX / USDC 0.05% | uniswap-v4-ethereum | 0x9f6e...04d5 | 0.2802472179 |
| TRX / USDC 0.3% | uniswap_v3 | 0x8759...8186 | 0.3405041994 |
| TRX / WETH | uniswap_v2 | 0x2183...0217 | 0.2992348196 |
| TRX / USDC 0.3% | sushiswap-v3-ethereum | 0xda6a...42d3 | 2.5191873099 |
| TRX / USDT | uniswap_v2 | 0x0ec4...ad6f | 0.5657768358 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.