Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
TKX / WETH | uniswap_v2 | 0xdab1...37c6 | 29.9819410866054 |
TKX / USDT | uniswap_v2 | 0x124a...7d1a | 30.0889895449681 |
TKX / WETH 1% | uniswap_v3 | 0x119f...ae96 | 29.762899649063 |
TKX / USDC | uniswap_v2 | 0xa703...2c03 | 29.9177997449118 |
XSGD / TKX | uniswap_v2 | 0xec20...651d | 30.2130179933077 |
TKX / ETH 0.3% | uniswap-v4-ethereum | 0x78d9...b9f0 | 31.4329249865 |
TKX / WETH 0.25% | pancakeswap-v3-ethereum | 0xad5f...4edb | 31.2107980949 |
TKX / WETH 0.3% | uniswap_v3 | 0xa013...19e1 | 31.2362794379 |
TKX / WETH 0.05% | uniswap_v3 | 0x2013...c1c4 | 31.0959636356 |
TKX / WETH 0.3% | sushiswap-v3-ethereum | 0xe5fc...4f3e | 31.1094085156 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.