| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| FTM / WETH 1% | uniswap_v3 | 0x3b68...716e | 0.0966068352846156 |
| FTM / WETH | sushiswap | 0x0e26...5efc | 0.0956855749276418 |
| FTM / USDT | orion-ethereum | 0x7570...7a26 | 0.0950378321930396 |
| FTM / ETH 1% | uniswap-v4-ethereum | 0x0b27...8b91 | 0.0912144471905721 |
| FTM / WETH | uniswap_v2 | 0x1ffc...290e | 0.0943672998201858 |
| FTM / WETH | smardex-ethereum | 0xea1b...ff28 | 0.8958332187 |
| FTM / WETH 0.3% | uniswap_v3 | 0x6465...add7 | 0.118733259400654 |
| FTM / fUSD | uniswap_v2 | 0x187a...c6f8 | 0.0942037294757067 |
| FTM / WETH | solidlydex | 0x3f18...f602 | 0.0970640971788079 |
| FTM / WBTC / MATIC / WETH / CRV 0.3% | balancer_ethereum | 0x7694...d784 | 0.1175134507 |
| FTM / USDC | solidlydex | 0x1372...fa20 | 0.0994660728041626 |
| FTM / USDT | smardex-ethereum | 0x3de9...10a8 | 0.123073207 |
| FTM / fUSD | uniswap_v2 | 0x729f...2501 | 0.1045360331 |
| FTM / USDT 0.3% | uniswap_v3 | 0xea70...a73a | 0.1677602246 |
| FTM / USDC 1% | uniswap_v3 | 0xc04c...244a | 0.1448942013 |
| VERSE / FTM 0.3% | uniswap_v3 | 0xfdb3...0e23 | 0.5101271163 |
| FTM / USDT | sushiswap | 0x3507...177c | 0.3211484096 |
| ICE / FTM | sushiswap | 0x6b2a...e044 | 0.5090216079 |
| FTM / DAI 1% | uniswap_v3 | 0xc218...a02c | 0.4827565208 |
| FTM / USDC | uniswap_v2 | 0x8256...b38c | 0.6066291252 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.