| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| FORTH / WETH 1% | uniswap_v3 | 0xc1df...bb1b | 1.56479474720839 |
| FORTH / WETH | uniswap_v2 | 0xf604...bd4e | 1.55705401962692 |
| FORTH / WETH 0.3% | uniswap_v3 | 0xbc9b...cc29 | 1.5618058043541 |
| FORTH / USDT | uniswap_v2 | 0x1812...2dd3 | 1.5610818938825 |
| FORTH / KABOSU | uniswap_v2 | 0x7f84...30bd | 1.57029605588805 |
| FORTH / WETH | sushiswap | 0x91c7...9502 | 1.49861433596614 |
| FORTH / USDT 0.3% | uniswap_v3 | 0x71ea...6860 | 3.7537309009 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.