| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| FLC / μLP 0.3% | uniswap_v3 | 0x5aeb...2cfa | 0.00962191946926553 |
| FLC / WETH 0.05% | uniswap_v3 | 0x19fe...5f7f | 0.005740202173 |
| FLC / WETH 1% | uniswap_v3 | 0x01a8...3476 | 0.000006524596659 |
| FLC / USDC 0.05% | uniswap_v3 | 0xf3a1...83a0 | 0.0151947104976196 |
| FLC / USDT 0.05% | uniswap_v3 | 0xebce...48db | 0.0179750806404544 |
| FLC / μMAYC 0.3% | uniswap_v3 | 0xeccf...710d | 0.0123926967437797 |
| FLC / WBTC 0.05% | uniswap_v3 | 0xded7...b2e6 | 0.0178573459687672 |
| FLC / μPPG 0.3% | uniswap_v3 | 0x1945...badd | 0.00952661566261011 |
| FLC / DAI 0.05% | uniswap_v3 | 0x2b2a...ede2 | 0.0178818229587061 |
| FLC / μBAYC 0.3% | uniswap_v3 | 0x86c1...ab3e | 0.0177594933999214 |
| FLC / wstETH 0.05% | uniswap_v3 | 0xa273...5206 | 0.017819993077756 |
| FLC / μCaptainz 0.3% | uniswap_v3 | 0x1c8e...358f | 0.0119051754058806 |
| FLC / μAZUKI 0.3% | uniswap_v3 | 0xe27b...9eb4 | 0.002773493958 |
| FLC / μy00t 0.3% | uniswap_v3 | 0xe286...e784 | 0.0178558581948857 |
| FLC / μPotatoz 0.3% | uniswap_v3 | 0x2d07...7427 | 0.0179596585888802 |
| FLC / μELEM 0.3% | uniswap_v3 | 0x547d...2995 | 0.0180058648335515 |
| FLC / μDEGODS 0.3% | uniswap_v3 | 0x57aa...fff6 | 0.00535353676030693 |
| FLC / μMFER 0.3% | uniswap_v3 | 0xfde0...2300 | 0.0177779497886939 |
| μKONGZBABY / FLC 0.3% | uniswap_v3 | 0xecf6...7a26 | 0.0178622223546846 |
| FLC / μ0N1 0.3% | uniswap_v3 | 0x0f14...9352 | 0.0179219601750962 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.