Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
FLC / μLP 0.3% | uniswap_v3 | 0x5aeb...2cfa | 0.00962191946926553 |
FLC / WETH 0.05% | uniswap_v3 | 0x19fe...5f7f | 0.005740202173 |
FLC / WETH 1% | uniswap_v3 | 0x01a8...3476 | 0.0001498896523 |
FLC / USDC 0.05% | uniswap_v3 | 0xf3a1...83a0 | 0.0151947104976196 |
FLC / USDT 0.05% | uniswap_v3 | 0xebce...48db | 0.0179750806404544 |
FLC / μMAYC 0.3% | uniswap_v3 | 0xeccf...710d | 0.0123926967437797 |
FLC / WBTC 0.05% | uniswap_v3 | 0xded7...b2e6 | 0.0178573459687672 |
FLC / μPPG 0.3% | uniswap_v3 | 0x1945...badd | 0.00952661566261011 |
FLC / μDEGODS 0.3% | uniswap_v3 | 0x57aa...fff6 | 0.00535353676030693 |
FLC / DAI 0.05% | uniswap_v3 | 0x2b2a...ede2 | 0.0178818229587061 |
FLC / μBAYC 0.3% | uniswap_v3 | 0x86c1...ab3e | 0.0177594933999214 |
FLC / wstETH 0.05% | uniswap_v3 | 0xa273...5206 | 0.017819993077756 |
FLC / μCaptainz 0.3% | uniswap_v3 | 0x1c8e...358f | 0.0119051754058806 |
FLC / μAZUKI 0.3% | uniswap_v3 | 0xe27b...9eb4 | 0.002773493958 |
FLC / μy00t 0.3% | uniswap_v3 | 0xe286...e784 | 0.0178558581948857 |
FLC / μPotatoz 0.3% | uniswap_v3 | 0x2d07...7427 | 0.0179596585888802 |
FLC / μELEM 0.3% | uniswap_v3 | 0x547d...2995 | 0.0180058648335515 |
FLC / μMFER 0.3% | uniswap_v3 | 0xfde0...2300 | 0.0177779497886939 |
μKONGZBABY / FLC 0.3% | uniswap_v3 | 0xecf6...7a26 | 0.0178622223546846 |
FLC / μ0N1 0.3% | uniswap_v3 | 0x0f14...9352 | 0.0179219601750962 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.