Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
DEXT / WETH | uniswap_v2 | 0xa29f...7d6d | 0.296614909507038 |
DEXT / WETH 1% | uniswap_v3 | 0x1910...ae94 | 0.294951700471347 |
HYBX / DEXT 1% | uniswap_v3 | 0xb761...d487 | 0.741663967209111 |
TOM3 / DEXT 0.3% | uniswap_v3 | 0xa5d8...3426 | 0.2252514957 |
$BURNA / DEXT 0.3% | uniswap-v4-ethereum | 0xaad5...bc57 | 0.2049310582 |
DEXT / USDC 1% | uniswap_v3 | 0xbd2a...e001 | 0.90356514800645 |
BTEC / DEXT 0.3% | uniswap-v4-ethereum | 0x71b4...705d | 0.211389072617393 |
USDT / DEXT 1% | uniswap_v3 | 0xd6c1...5dce | 0.4566625338 |
DEXT / ETH 0.3% | uniswap-v4-ethereum | 0x5c97...aabd | 1.0496396661 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.