| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| FLT / ETH 1% | uniswap-v4-ethereum | 0x6bc8...8214 | 0.00536819166193503 |
| FLT / WETH 1% | uniswap_v3 | 0x983b...293e | 0.00532439677141232 |
| FLT / WETH 0.3% | uniswap_v3 | 0x8d25...6853 | 0.5010758485 |
| FLT / USDC 1% | uniswap_v3 | 0x71dc...c81c | 0.00543127124388997 |
| FLT / DAI 0.3% | uniswap_v3 | 0x8191...a487 | 0.7505455726 |
| FLT / USDT 1% | uniswap_v3 | 0xab27...123b | 0.460888950252089 |
| FLT / WETH | uniswap_v2 | 0x38d8...3fac | 0.940536936831316 |
| FLT / WETH 0.05% | uniswap_v3 | 0xa87d...08cc | 0.01410637781 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.