| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| XING / WETH | uniswap_v2 | 0x2602...2cbc | 0.0001688534791 |
| XING / ETH 1% | uniswap-v4-ethereum | 0xdf00...3f7e | 0.01657306631 |
| XING / WETH 1% | uniswap_v3 | 0x172e...dd79 | 0.0007885771537 |
| XING / USDC 0.3% | uniswap-v4-ethereum | 0xac47...0252 | 0.01771768044 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.