Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
FLUID / WETH 1% | uniswap_v3 | 0xc1cd...676f | 5.00753169985285 |
FLUID / WETH 0.3% | uniswap_v3 | 0xcba2...6ecb | 5.14201611294668 |
FLUID / USDC | uniswap_v2 | 0x24f5...f8c0 | 3.57495668862291 |
FLUID / WETH | uniswap_v2 | 0x6e04...d697 | 4.05597691321399 |
RNG / FLUID 0.3% | uniswap_v3 | 0xd81e...a585 | 1.67500224424597 |
FLUID / cbBTC 0.3% | uniswap_v3 | 0xd86c...2971 | 5.8584393941 |
FLUID / USDC 1% | uniswap_v3 | 0xea34...8090 | 0.690052241870614319565538250958 |
FLUID / USDC 0.3% | uniswap_v3 | 0xb8f9...7c29 | 9.591346712 |
FLUID / USDT 1% | uniswap_v3 | 0xf746...0485 | 2.59469338908143 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.