| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| FEG / WETH | uniswap_v2 | 0x8543...d872 | 0.0000000000152992076086162 |
| FEG / WETH | shibaswap | 0xba55...c67f | 0.0000000000154607938518827 |
| FEG / TREAT | uniswap_v2 | 0x6228...c317 | 0.00000000001512348289 |
| FEG / RMD | uniswap_v2 | 0xf8eb...17fe | 0.00000000001616208391 |
| FEG / LunaShib | uniswap_v2 | 0xf6a4...2c75 | 0.000000000027121902 |
| ChiefHopper / FEG | uniswap_v2 | 0x9a29...6b92 | 0.00000000002122215553 |
| FEG / BONE | shibaswap | 0x8e62...cf6f | 0.00000000001607696996 |
| FEG / SHIB | shibaswap | 0xca6c...e205 | 0.0000000000150484603 |
| FEG / HNL | uniswap_v2 | 0xd667...7b57 | 0.00000000001486060498 |
| HID / FEG | uniswap_v2 | 0xe490...7001 | 0.00000000002601263792 |
| FEG / GRPFT | shibaswap | 0xcad1...5180 | 0.00000000003697459796 |
| FEG / KISHU | shibaswap | 0xb907...414b | 0.00000000002591348532 |
| FEG / FEG | uniswap_v2 | 0xc264...0b44 | 0.0000000000959549030958487 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.