| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| DXN / WETH 1% | uniswap_v3 | 0x7f80...5372 | 0.02721363785 |
| XEN / DXN 2% | uniswap-v4-ethereum | 0x0042...f399 | 0.0287680848084515 |
| NXD / DXN | uniswap_v2 | 0x9813...13ac | 0.0266286197138117 |
| XEN / DXN 1% | uniswap_v3 | 0xffdb...f825 | 0.0232326172990051 |
| DXN / ETH 1% | uniswap-v4-ethereum | 0x3b53...6990 | 0.02714997509 |
| DXN / USDC 0.3% | uniswap-v4-ethereum | 0x16c1...fe1d | 0.2866883061 |
| DXN / USDC 25% | uniswap-v4-ethereum | 0x44f8...97b6 | 0.02787992369 |
| DXN / USDC 88.75% | uniswap-v4-ethereum | 0x7389...11dc | 0.005320350584 |
| DXN / USDC 50% | uniswap-v4-ethereum | 0xa269...84d5 | 0.02979291141 |
| DXN / USDT 1% | uniswap-v4-ethereum | 0x8118...41a3 | 0.2293790037 |
| DXN / WETH 0.3% | uniswap_v3 | 0x26a5...f6d7 | 1.9971126304 |
| XLON / DXN 1% | uniswap_v3 | 0x7ceb...01d9 | 0.0290345661912037 |
| INDEX / vBNT / FLUID / michi / DXN / CRV / SHIV / FOFAR 0.3% | balancer-v3-ethereum | 0x5d73...ca27 | 0.3333148558 |
| DXN / TrumpBucks 1% | uniswap-v4-ethereum | 0x1deb...3866 | 0.02642153869 |
| DXN / USDC 1% | uniswap_v3 | 0x30aa...713e | 24.6430706565439 |
| CPSJ / DXN | uniswap_v2 | 0x25f0...0edb | 0.3113347022 |
| APE2 / DXN | uniswap_v2 | 0x459f...1523 | 0.02726385597 |
| XenBurner / DXN | uniswap_v2 | 0x2c56...2f3c | 0.0282784657 |
| XEN / DXN 0.3% | uniswap-v4-ethereum | 0x43b0...41a2 | 0.1979020079 |
| DXN / USDC 0.3% | uniswap_v3 | 0xc404...70f8 | 4.93097676415628 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.