| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| DEXT / WETH | uniswap_v2 | 0xa29f...7d6d | 0.163103522563239 |
| USDS / DEXT 1% | uniswap_v3 | 0xe257...b9a4 | 0.161479199798661 |
| DEXT / WETH 1% | uniswap_v3 | 0x1910...ae94 | 0.171136850526792 |
| TOM3 / DEXT 0.3% | uniswap_v3 | 0xa5d8...3426 | 0.170144598275115 |
| $BURNA / DEXT 0.3% | uniswap-v4-ethereum | 0xaad5...bc57 | 0.3621982164 |
| CAT'N / DEXT | uniswap_v2 | 0x10b5...96c4 | 0.1701959891 |
| WOLFIE / DEXT 1% | uniswap_v3 | 0xc199...bdae | 0.1799895248 |
| BTEC / DEXT 0.3% | uniswap-v4-ethereum | 0x71b4...705d | 0.2113890726 |
| DEXT / ETH 0.3% | uniswap-v4-ethereum | 0x5c97...aabd | 0.5206358832 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.