| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| DEXT / WETH | uniswap_v2 | 0xa29f...7d6d | 0.204831418540729 |
| USDS / DEXT 1% | uniswap_v3 | 0xe257...b9a4 | 0.208562366842353 |
| TOM3 / DEXT 0.3% | uniswap_v3 | 0xa5d8...3426 | 0.214641808257186 |
| CAT'N / DEXT | uniswap_v2 | 0x10b5...96c4 | 0.185023242379532 |
| DEXT / WETH 1% | uniswap_v3 | 0x1910...ae94 | 0.204011863150644 |
| $BURNA / DEXT 0.3% | uniswap-v4-ethereum | 0xaad5...bc57 | 0.3621982164 |
| WOLFIE / DEXT 1% | uniswap_v3 | 0xc199...bdae | 0.211998297416361 |
| BTEC / DEXT 0.3% | uniswap-v4-ethereum | 0x71b4...705d | 0.2113890726 |
| USDT / DEXT 1% | uniswap_v3 | 0xd6c1...5dce | 0.4566625338 |
| DEXT / ETH 0.3% | uniswap-v4-ethereum | 0x5c97...aabd | 0.5206358832 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.