| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| FUSE / WETH | uniswap_v2 | 0x4ce3...5c4d | 0.008174220763085 |
| FUSE / oneFUSE 1% | uniswap_v3 | 0x8cf2...b196 | 0.00823906173147275 |
| FUSE / WETH 0.25% | pancakeswap-v3-ethereum | 0x3260...b526 | 0.0685164682981031 |
| FUSE / WETH 0.3% | uniswap_v3 | 0x9127...da73 | 0.03915874072 |
| FUSE / WETH | pancakeswap_ethereum | 0xf9b0...8cc7 | 0.00836881756275663 |
| FUSE / USDC | uniswap_v2 | 0x6118...46fe | 0.0083627477199048 |
| ICHI / FUSE 0.3% | uniswap_v3 | 0x8312...ceda | 0.00929720947 |
| FUSE / WETH | sushiswap | 0x9e8f...000d | 0.0108046963 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.