| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| NEXO / WETH 0.3% | uniswap_v3 | 0x4c54...087f | 0.8715580145 |
| NEXO / ETH 0.3% | uniswap-v4-ethereum | 0xd753...212e | 0.8777570707 |
| KEL / NEXO | uniswap_v2 | 0x9b09...f4a8 | 0.880797949155078 |
| NEXO / WETH | uniswap_v2 | 0x2615...dc13 | 0.8728869649 |
| NEXO / USDT 1% | uniswap-v4-ethereum | 0x8c79...11a5 | 0.8713232259 |
| DAI / NEXO 1% | uniswap-v4-ethereum | 0x8c18...c898 | 0.876459571639902 |
| NEXO / USDT | uniswap_v2 | 0x8df6...2218 | 0.8980648973 |
| NEXO / WETH 0.25% | balancer_ethereum | 0x5e69...60c8 | 0.8519600289 |
| NEXO / ZIK 1% | uniswap-v4-ethereum | 0x4171...796f | 0.7692587724 |
| USDC / NEXO 1% | uniswap-v4-ethereum | 0xa8ec...c853 | 0.874366180769691 |
| NEXO / USDC 1% | uniswap_v3 | 0xa6c8...411b | 0.630814501219530825985867036842 |
| RIO / NEXO | uniswap_v2 | 0x8f61...e4e9 | 0.900517285345629 |
| NEXO / USDT 0.5% | uniswap-v4-ethereum | 0x5867...91aa | 0.8886580829 |
| NEXO / USDC 0.3% | uniswap_v3 | 0x8f4d...44dc | 1.018857773976740421742094522332 |
| NEXO / DAI | uniswap_v2 | 0xdc01...1b14 | 0.9047507572 |
| NEXO / USDT 1% | uniswap_v3 | 0xe244...d873 | 1.2875153978 |
| NEXO / USDC | uniswap_v2 | 0x973c...352e | 6.3194640916 |
| CEL / NEXO | uniswap_v2 | 0xdd65...5f59 | 0.548937815892001 |
| NEXO / KABOSU | uniswap_v2 | 0xc618...7d90 | 0.9061681042 |
| NEXO / WETH 0.05% | uniswap_v3 | 0x2a14...9031 | 1.2987832427113 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.