| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| USDT / SXT 0.3% | uniswap_v3 | 0x20c4...63e3 | 0.0179376021177742 |
| SXT / ETH 2% | uniswap-v4-ethereum | 0x8434...8181 | 0.01783336859 |
| SXT / WETH 1% | uniswap_v3 | 0x9845...15a4 | 0.01813162968 |
| SXT / ETH 1% | uniswap-v4-ethereum | 0x00c3...f68d | 0.1375572429 |
| USDT / SXT 1% | uniswap-v4-ethereum | 0x4c3f...db0d | 0.149095908 |
| USDC / SXT 90% | uniswap-v4-ethereum | 0x5089...244d | 0.1478077354 |
| USDC / SXT 0.3% | uniswap-v4-ethereum | 0xe950...0c80 | 0.09983607651 |
| SXT / USDT 1% | uniswap_v3 | 0x5e74...3c70 | 0.1422565401 |
| USDC / SXT 1% | uniswap_v3 | 0x87c0...3de7 | 0.1039854668 |
| KABOSU / SXT | uniswap_v2 | 0xfed1...b78e | 0.02507309608 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.