| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| DXN / WETH 1% | uniswap_v3 | 0x7f80...5372 | 0.114077064328371 |
| NXD / DXN | uniswap_v2 | 0x9813...13ac | 0.114187984232491 |
| XEN / DXN 1% | uniswap_v3 | 0xffdb...f825 | 0.112396972774114 |
| XEN / DXN 2% | uniswap-v4-ethereum | 0x0042...f399 | 0.112508833386665 |
| DXN / ETH 1% | uniswap-v4-ethereum | 0x3b53...6990 | 0.116078950277222 |
| DXN / USDC 0.3% | uniswap-v4-ethereum | 0x16c1...fe1d | 0.2866883061 |
| XLON / DXN 1% | uniswap_v3 | 0x7ceb...01d9 | 0.143735512619626 |
| DXN / TrumpBucks 1% | uniswap_v3 | 0x1849...82a0 | 0.1406454168 |
| DXN / USDT 1% | uniswap-v4-ethereum | 0x8118...41a3 | 0.2293790037 |
| DXN / WETH 0.3% | uniswap_v3 | 0x26a5...f6d7 | 1.9971126304 |
| APE2 / DXN | uniswap_v2 | 0x459f...1523 | 0.1838269823 |
| XenBurner / DXN | uniswap_v2 | 0x2c56...2f3c | 0.2402814761 |
| DXN / USDC 1% | uniswap_v3 | 0x30aa...713e | 24.6430706565439 |
| CPSJ / DXN | uniswap_v2 | 0x25f0...0edb | 0.3113347022 |
| XEN / DXN 0.3% | uniswap-v4-ethereum | 0x43b0...41a2 | 0.1979020079 |
| DXN / USDC 0.3% | uniswap_v3 | 0xc404...70f8 | 4.93097676415628 |
| XEN / DXN 0.3% | uniswap_v3 | 0xcb19...9cc8 | 69.887058310309020067910383011 |
| DXN / WPLS 1% | uniswap_v3 | 0x67aa...c6c9 | 1.08225117517879 |
| DXN / WETH | uniswap_v2 | 0x8f47...7d19 | 0.3748272442 |
| DXN / VMPX 1% | uniswap_v3 | 0x167d...1e70 | 2.13062555939247 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.