| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| FT / USDC 1% | uniswap_v3 | 0xddba...70e6 | 0.0978122023662362 |
| FT / ETH 0.3% | uniswap-v4-ethereum | 0x8552...d967 | 0.0986806320887267 |
| FT / ETH 1% | uniswap-v4-ethereum | 0x4a9b...6551 | 0.099881213719814 |
| FT / USDC 0.99% | uniswap-v4-ethereum | 0xcc1f...feb9 | 0.0980969533270385 |
| FT / USDC 0.05% | uniswap-v4-ethereum | 0xa8a2...7e06 | 0.0990142822626661 |
| FT / USDC 4% | uniswap-v4-ethereum | 0x588c...8dfe | 0.0952265618371882 |
| FT / USDC 5% | uniswap-v4-ethereum | 0x146f...bf06 | 0.0969814953101836 |
| FT / WETH 1% | uniswap_v3 | 0x2cb2...da36 | 0.100086885942932 |
| FT / USDC 0.3% | uniswap_v3 | 0x5c70...4d81 | 0.296662210357637 |
| FT / USDT 0.05% | uniswap-v4-ethereum | 0xf797...8edf | 0.300224920632435 |
| FT / USDT 0.01% | uniswap-v4-ethereum | 0xfba5...5299 | 0.300555375308161 |
| FT / USDT 0.3% | uniswap-v4-ethereum | 0x9827...b69b | 0.297244967398965 |
| FT / USDC 0.01% | uniswap-v4-ethereum | 0xd656...80e3 | 0.299784738092057 |
| FT / USDC 0.3% | uniswap-v4-ethereum | 0x6187...e621 | 0.296415027842678 |
| FT / USDC 1% | uniswap-v4-ethereum | 0xd8fd...800e | 0.284326850159419 |
| FT / USDC 4.99% | uniswap-v4-ethereum | 0x8db1...3252 | 0.882479883155095 |
| FT / USDC 0.01% | uniswap_v3 | 0x11a0...3398 | 0.300025358177174 |
| FT / USDC 0.05% | uniswap_v3 | 0xdaf5...f4e8 | 0.299635627944255 |
| FT / USDC | uniswap_v2 | 0x30f2...425c | 0.10019970897555 |
| FT / USDT 1% | uniswap_v3 | 0x3359...78a8 | 0.2921496937 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.