Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
XPR / WETH 1% | uniswap_v3 | 0x464b...76b3 | 0.0038937696209649 |
XPR / ETH 10% | uniswap-v4-ethereum | 0x4244...b8c0 | 0.00386922931574813 |
XPR / WETH 0.3% | uniswap_v3 | 0x06f1...7726 | 0.00423911893639966 |
XPR / WETH | uniswap_v2 | 0x8963...27fa | 0.00394987005804125 |
XPR / USDT 1% | sushiswap-v3-ethereum | 0x42d4...3232 | 0.003975222544 |
XPR / ETH 2.5% | uniswap-v4-ethereum | 0x990f...7d23 | 0.004958421343 |
XPR / USDT | sushiswap | 0xd34c...5f7d | 0.003919874299 |
XPR / WBTC | uniswap_v2 | 0x3999...a1d2 | 0.002804754227 |
XPR / USDT | uniswap_v2 | 0xb63c...df0f | 0.004792115581 |
MTL / XPR | uniswap_v2 | 0x6c78...a9f8 | 0.000781289682287147 |
XPR / ETH 2% | uniswap-v4-ethereum | 0x232d...41f7 | 0.003623012852 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.