| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| USDT / NEXM 8% | uniswap-v4-ethereum | 0xd835...bfce | 0.005044721079 |
| USDC / NEXM 9% | uniswap-v4-ethereum | 0xf40c...81bf | 0.006083173311 |
| NEXM / USDT 1% | uniswap_v3 | 0xcc7a...9e94 | 0.6121801771 |
| NEXM / ETH 30% | uniswap-v4-ethereum | 0xd812...178b | 0.004731047204 |
| NEXM / ETH 8% | uniswap-v4-ethereum | 0xa5ab...7c17 | 0.001050945635 |
| NEXM / ETH 20% | uniswap-v4-ethereum | 0xc96e...78cf | 0.001651011892 |
| NEXM / USDT 0.01% | uniswap_v3 | 0x49a2...99d4 | 0.0532318506046419 |
| NEXM / USDT 0.05% | uniswap_v3 | 0xb58c...011f | |
| NEXM / USDT 0.3% | uniswap_v3 | 0x2565...87ed |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.