Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
TKX / WETH | uniswap_v2 | 0xdab1...37c6 | 2.90764570917957 |
TKX / USDT | uniswap_v2 | 0x124a...7d1a | 2.89393282330444 |
TKX / USDC | uniswap_v2 | 0xa703...2c03 | 2.89317093968321 |
XSGD / TKX | uniswap_v2 | 0xec20...651d | 2.88167250638587 |
TKX / WETH 1% | uniswap_v3 | 0x119f...ae96 | 10.4276709175 |
TKX / ETH 0.3% | uniswap-v4-ethereum | 0x78d9...b9f0 | 25.9336756707 |
TKX / WETH 0.25% | pancakeswap-v3-ethereum | 0xad5f...4edb | 31.2107980949 |
TKX / WETH 0.3% | uniswap_v3 | 0xa013...19e1 | 32.9816628614 |
TKX / WETH 0.3% | sushiswap-v3-ethereum | 0xe5fc...4f3e | 31.1094085156 |
TKX / WETH 0.05% | uniswap_v3 | 0x2013...c1c4 | 25.7966071894 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.