| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| USDC / USDX 88% | uniswap-v4-ethereum | 0x2230...6bc7 | 0.936607285167622 |
| USDX / USDT 80% | uniswap-v4-ethereum | 0xfd58...d4a7 | 0.03956579677 |
| USDX / USDC | curve | 0xa9d2...fd4a | 0.9172570481 |
| USDX / USDC 80% | uniswap-v4-ethereum | 0x6529...c0e9 | 0.8497307483 |
| USDX / USDC 40% | uniswap-v4-ethereum | 0x8ac3...d505 | 0.2113133606 |
| USDX / USDT 50% | uniswap-v4-ethereum | 0x4366...2692 | 0.3415851099 |
| USDX / USDT 99.91% | uniswap-v4-ethereum | 0xdee8...6a8a | 0.04135785762 |
| USDX / USDC 99.9% | uniswap-v4-ethereum | 0xf6ca...3b94 | 0.06590354799 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.