| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| OX / SPX | uniswap_v2 | 0x7c01...381d | 0.0000316272573674436 |
| WOJAK / OX | uniswap_v2 | 0xb5a0...fc48 | 0.000031242449736255 |
| LMEOW / OX | uniswap_v2 | 0xcc05...8753 | 0.0000306955653157427 |
| GEC / OX | uniswap_v2 | 0xa082...d442 | 0.0000284023190373251 |
| USDC / OX 88% | uniswap-v4-ethereum | 0x20ac...0f34 | 0.001690188938 |
| OX / WETH 1% | uniswap_v3 | 0x4972...cda8 | 0.003239833501 |
| OX / OX 1% | uniswap_v3 | 0x3cbc...ed46 | 0.02071060295 |
| OX / USDT 88% | uniswap-v4-ethereum | 0x5ceb...94a6 | 0.00001192271193 |
| RPK / OX | uniswap_v2 | 0x0a7d...d148 | 0.00004165622856 |
| THREE / OX | uniswap_v2 | 0x5231...8940 | 0.00006496643645 |
| NII / OX | uniswap_v2 | 0x62d2...2ed9 | 0.002997771981 |
| OX / WETH | uniswap_v2 | 0xab72...a0fd | 0.000000621239468 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.