Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
FUSE / WETH | uniswap_v2 | 0x4ce3...5c4d | 0.0108311108174945 |
FUSE / WETH | pancakeswap_ethereum | 0xf9b0...8cc7 | 1.85471446979332 |
FUSE / oneFUSE 1% | uniswap_v3 | 0x8cf2...b196 | 0.0106980144328671 |
FUSE / WETH 1% | uniswap_v3 | 0xe747...544f | 0.00000000000000000000000000000000000421939803631986 |
FUSE / WETH 0.25% | pancakeswap-v3-ethereum | 0x3260...b526 | 0.0685164682981031 |
FUSE / WETH 0.3% | uniswap_v3 | 0x9127...da73 | 0.01932818961 |
ICHI / FUSE 0.3% | uniswap_v3 | 0x8312...ceda | 0.0134844612 |
FUSE / USDC | uniswap_v2 | 0x6118...46fe | 0.01197080153 |
FUSE / WETH | sushiswap | 0x9e8f...000d | 0.01455588662 |
FUSE / USDC 1% | uniswap_v3 | 0xbbf5...09a6 | 0.376936306502456 |
FUSE / DAI | uniswap_v2 | 0xeb54...2b14 | 0.0810510315441444 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.