| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| FT / USDC 0.99% | uniswap-v4-ethereum | 0xcc1f...feb9 | 0.07554736514 |
| FT / fBOMB | uniswap_v2 | 0xd281...5ed1 | 0.07672098274 |
| FT / USDC 1% | uniswap_v3 | 0xddba...70e6 | 0.09258843854 |
| FT / USDC 0.6% | uniswap-v4-ethereum | 0xac6e...2223 | 0.09594337889 |
| FT / ftUSD 1% | uniswap_v3 | 0x47e1...2a58 | 0.09217031727 |
| FT / USDC 4% | uniswap-v4-ethereum | 0x588c...8dfe | 0.0773066265 |
| FT / ETH 1% | uniswap-v4-ethereum | 0x4a9b...6551 | 0.08435311949 |
| FT / ETH 0.3% | uniswap-v4-ethereum | 0x8552...d967 | 0.08258601008 |
| FT / USDC 0.3% | uniswap_v3 | 0x5c70...4d81 | 0.09593541482 |
| FT / USDC 5% | uniswap-v4-ethereum | 0x146f...bf06 | 0.09698149531 |
| FT / ftUSD 0.59% | uniswap-v4-ethereum | 0x8a40...0d2a | 0.09552134547 |
| FT / USDC 0.9% | uniswap-v4-ethereum | 0x8187...5ceb | 0.09877201406 |
| FT / WETH 1% | uniswap_v3 | 0x2cb2...da36 | 0.07244610898 |
| FT / USDT 0.51% | uniswap-v4-ethereum | 0xf795...c2eb | 0.09807638413 |
| FT / USDC 0.05% | uniswap-v4-ethereum | 0xa8a2...7e06 | 0.08135901749 |
| FT / USDT 0.3% | uniswap-v4-ethereum | 0x9827...b69b | 0.2972449674 |
| FT / USDC 0.01% | uniswap-v4-ethereum | 0xd656...80e3 | 0.2997847381 |
| FT / USDT 0.01% | uniswap-v4-ethereum | 0xfba5...5299 | 0.3005553753 |
| FT / USDC 0.3% | uniswap-v4-ethereum | 0x6187...e621 | 0.2964150278 |
| FT / USDT 0.05% | uniswap-v4-ethereum | 0xf797...8edf | 0.3002249206 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.