| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| NKN / USDT 0.3% | uniswap_v3 | 0xf743...7035 | 0.0105454780537501 |
| NKN / WETH 1% | uniswap_v3 | 0x1260...3052 | 0.0104864054690154 |
| NKN / USDC 0.3% | uniswap_v3 | 0x2703...2c48 | 0.0104983325268303 |
| NKN / UNI 0.3% | uniswap_v3 | 0x4e5f...e6b8 | 0.05166123061 |
| NKN / USDC 88% | uniswap-v4-ethereum | 0x395e...2355 | 0.00360328649731671 |
| NKN / USDT | uniswap_v2 | 0x7f75...1862 | 0.1131240930175 |
| NKN / KABOSU | uniswap_v2 | 0xd47c...db99 | 0.01228242099 |
| NKN / WETH 0.3% | uniswap_v3 | 0xb145...ad71 | 0.0 |
| NKN / WETH | uniswap_v2 | 0x1740...e8a1 | 0.0000000000123148210076881 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.