| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| IMX / WETH 1% | uniswap_v3 | 0xfd76...68b6 | 0.180194452869517 |
| IMX / WETH | sushiswap | 0x18cd...73d8 | 0.1803791448154 |
| IMX / WETH 0.3% | uniswap_v3 | 0x81fb...13aa | 0.180615996766984 |
| IMX / WETH | uniswap_v2 | 0x0149...f491 | 0.178100454816916 |
| IMX / ETH 1% | uniswap-v4-ethereum | 0x0f93...b4f6 | 0.17249135003439 |
| IMX / ETH 0.05% | uniswap-v4-ethereum | 0x0175...c828 | 0.176960392077668 |
| USDT / IMX 1% | uniswap-v4-ethereum | 0x12aa...74f0 | 0.198374498314164 |
| IMX / WETH 0.3% | sushiswap-v3-ethereum | 0x3cc0...bc68 | 1.398543767 |
| ICHI / IMX 1% | uniswap_v3 | 0x765c...6d4e | 0.5621274674 |
| NPC / IMX 0.3% | uniswap-v4-ethereum | 0x6127...70d5 | 0.5943395482 |
| ICHI / IMX 0.3% | uniswap_v3 | 0x7448...b0d2 | 0.212578052300827 |
| ABDS / IMX 0.3% | uniswap-v4-ethereum | 0x61b2...b358 | 0.2778184269 |
| IMX / ETH 0.3% | uniswap-v4-ethereum | 0x8833...2482 | 0.5871817877 |
| IMX / USDC | uniswap_v2 | 0x11b3...c2c7 | 0.25504208244959 |
| IMX / USDC | sushiswap | 0x5bbf...5ff5 | 0.2131060229 |
| NPC / IMX 0.3% | uniswap-v4-ethereum | 0x5c4a...f2be | 0.5959074912 |
| LRC / IMX | sushiswap | 0x6cbf...9e18 | 0.6363759089 |
| IMX / UNI | sushiswap | 0xc3b2...dcec | 1.1290869539 |
| IMX / USDC 0.3% | uniswap_v3 | 0x74f3...3e8a | 0.787057746751012 |
| DRGN / IMX 1% | uniswap_v3 | 0x9879...e3e8 | 0.860141443212799305384138775477 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.