| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| DEXTF / WETH | uniswap_v2 | 0xa144...8e00 | 0.0464041936091227 |
| DEXTF / XTF2XXXXTF | uniswap_v2 | 0x284e...50e7 | 0.0468871998903125 |
| DEXTF / WETH 0.3% | uniswap_v3 | 0xe9c7...71b3 | 0.0465326633264872 |
| DEXTF / WETH | sushiswap | 0xd3c4...a859 | 0.046587994483706 |
| DEXTF / USDC 0.3% | uniswap-v4-ethereum | 0xd269...d5b9 | 0.1293965527 |
| DEXTF / USDC 1% | uniswap-v4-ethereum | 0x6539...cc6a | 0.09914510167 |
| XTF.WWW1 / DEXTF | uniswap_v2 | 0xe8fc...35bb | 0.0829437801 |
| XTF.SPECTR / DEXTF | uniswap_v2 | 0x90d9...9e35 | 0.182564591486507 |
| DEXTF / XTF.XXXXTF | uniswap_v2 | 0x2824...4060 | 0.0494699822897454 |
| XTF2SPECTR / DEXTF | uniswap_v2 | 0x3d56...e74a | 0.08788921797 |
| DEXTF / USDC 1% | uniswap_v3 | 0x6bfc...0c96 | 0.2819515139 |
| DEXTF / USDC 0.3% | uniswap_v3 | 0x2ecd...6783 | 0.1887746268 |
| DEXTF / USDT 0.3% | uniswap_v3 | 0xc59e...8ca9 | 0.200521694246294 |
| DEXTF / WETH 1% | uniswap_v3 | 0x6cc2...9150 | 0.0650604859951709 |
| DEXTF / DAI 0.3% | uniswap_v3 | 0x2df0...3e2b | 0.0850833285558079611272290569678 |
| DEXTF / USDC 0.01% | uniswap_v3 | 0x5603...5a6f | 0.1565550727739444890675057815756 |
| XTF2WWWAAC / DEXTF | uniswap_v2 | 0x4bf1...b247 | 0.19821507261638760782465381218533618456162495198452448914167508916390230037108706624240946 |
| XTF2UUUAAA / DEXTF | uniswap_v2 | 0x033b...0585 | 0.188529105661620899826657336075463420999788427664452878047398394089472766247394530645328808 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.