| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| XDOGE / WETH | uniswap_v2 | 0xeea7...2267 | 0.000000006315494832 |
| XDOGE / WETH | dodo-pmm-ethereum | 0x8576...e2d1 | 0.000000006009355025 |
| XDOGE / USDT 99.991% | uniswap-v4-ethereum | 0x4d0a...ca4d | 0.0000000009850643647 |
| XDOGE / USDT 50% | uniswap-v4-ethereum | 0x93a5...d73a | 0.000000007256908447 |
| XDOGE / USDT 99.999% | uniswap-v4-ethereum | 0x0c52...5e15 | 0.0000000009808002225 |
| USDC / XDOGE 60% | uniswap-v4-ethereum | 0x2958...69ce | 0.000000006237855241 |
| XDOGE / USDT | uniswap_v2 | 0x0310...8979 | 0.000000007017844196 |
| XDOGE / USDT 1% | uniswap_v3 | 0x8f9c...9597 | 0.000000234341122564628 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.