| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ETH / XYO 0.3% | uniswap-v4-ethereum | 0x3485...9906 | 0.00518905920048635 |
| XYO / USDT 0.3% | uniswap-v4-ethereum | 0x3e52...a734 | 0.00517856644424812 |
| XYO / XL1 0.3% | uniswap-v4-ethereum | 0x44cb...8558 | 0.00518190839836983 |
| XYO / WETH 0.3% | uniswap_v3 | 0xe331...c2da | 0.00518014180643503 |
| XYO / USDC 0.3% | uniswap-v4-ethereum | 0x0ca0...92ed | 0.00515978645385275 |
| XYO / WETH | uniswap_v2 | 0xa986...8ba1 | 0.00520770383969799 |
| XYO / WETH | curve | 0x99e0...4624 | 0.00508722815828911 |
| rust / XYO 1% | uniswap-v4-ethereum | 0x56b7...f55d | 0.0051926151285109 |
| XYO / WBTC 0.01% | uniswap_v3 | 0xc1e5...9338 | 0.00519764921928466 |
| XYO / SHPING 0.3% | uniswap_v3 | 0xc908...0197 | 0.00515921940276156 |
| SPARKLET / XYO 0.3% | uniswap_v3 | 0x07bf...aeab | 0.006164107068 |
| XYO / WETH 1% | uniswap_v3 | 0x8a44...be10 | 0.00568478759635609 |
| XYO / LINK 0.3% | uniswap_v3 | 0x4693...a1e4 | 0.00543043962704851072768581911346 |
| XYO / ETHMNY 1% | uniswap_v3 | 0xe37a...1dc4 | 0.00567843224829728 |
| XYO / ETHMNY | sushiswap | 0xd576...b23f | 0.00577680852166407 |
| XYO / STORJ 1% | uniswap_v3 | 0xbef5...8aeb | 0.0107267169 |
| XYO / WETH | sushiswap | 0x0c96...2a00 | 0.00568562841969263 |
| XYO / ETHMNY 3% | balancer_ethereum | 0x0cda...f709 | 0.0056790025631342 |
| XYO / USDT 0.3% | uniswap_v3 | 0xd0af...a484 | 0.01582004143 |
| XYO / ETHMNY 1% | uniswap-v4-ethereum | 0xcf94...3bdf | 0.00569096564130865 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.