| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| F9 / WETH | uniswap_v2 | 0x459e...3597 | 0.000431634183598048 |
| F9 / WETH | shibaswap | 0x29ba...b329 | 0.0003897779747 |
| F9 / WETH 1% | balancer_ethereum | 0x5403...5dca | 0.0006597966702 |
| F9 / WETH 0.3% | uniswap_v3 | 0x5d2f...adc9 | 0.0003902523318 |
| F9 / DEV9 | uniswap_v2 | 0xea46...3960 | 0.0003919770996 |
| F9 / FDX 1% | uniswap_v3 | 0x17bc...d804 | 0.0003694788617 |
| F9 / xF9 1% | uniswap_v3 | 0x63d6...0c04 | 0.0004009852761 |
| F9 / sF9 1% | uniswap_v3 | 0x5a51...e033 | 0.0003997485234 |
| F9 / DAO9 | uniswap_v2 | 0x176b...ab8c | 0.0006174837563 |
| F9 / wF9 1% | uniswap_v3 | 0xd364...85c2 | 0.0003896401956 |
| METAIX / F9 1% | uniswap_v3 | 0x53b6...779a | 0.0004148694864 |
| F9 / USDC | shibaswap | 0x43fa...4703 | 0.0006084971535 |
| F9 / BONE | shibaswap | 0xec6d...cd83 | 0.00227348521648865569346577222239701689121840289929205892401624932149358208408883563289329136 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.