| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| FNXAI / USDT | dodo-pmm-ethereum | 0x0795...815b | 0.00005605709767 |
| FNXAI / USDC 35% | uniswap-v4-ethereum | 0xee5a...749e | 0.00005055673233 |
| FNXAI / ETH 27% | uniswap-v4-ethereum | 0x5f97...bc8f | 0.0000624456127 |
| FNXAI / ETH 50% | uniswap-v4-ethereum | 0xd29b...2911 | 0.00002757650874 |
| FNXAI / USDC 28% | uniswap-v4-ethereum | 0xcbfe...5a57 | 0.00005356271789 |
| FNXAI / USDT 90% | uniswap-v4-ethereum | 0x2a98...1610 | 0.00001937717192 |
| FNXAI / USDC 29% | uniswap-v4-ethereum | 0x9b6a...1750 | 0.00007237779443 |
| FNXAI / USDC 34% | uniswap-v4-ethereum | 0x875f...b45d | 0.1298818926 |
| FNXAI / USDC 32% | uniswap-v4-ethereum | 0x03a5...dc4c | 0.00005646964712 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.