Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
XFI / WETH | uniswap_v2 | 0xaf99...9a00 | 58.0465628557 |
LID / XFI | uniswap_v2 | 0x717d...85f6 | 39.1554500088636498067462378659819394035105902785797794841127638635285258615283694762024002 |
XFI / USDT | uniswap_v2 | 0x4a43...b352 | 43.3298437134 |
XSP / XFI | uniswap_v2 | 0x501d...53e9 | 58.2211884756 |
XFI / XCORE | uniswap_v2 | 0xbc78...04e3 | 43.4929698837 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.