| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| FET / WETH 1% | uniswap_v3 | 0x948b...a052 | 0.239502089116939 |
| FET / WETH 0.3% | uniswap_v3 | 0x7441...5377 | 0.238121027801229 |
| FET / USDC 1% | uniswap_v3 | 0xc931...c573 | 0.239425811546369 |
| FET / ETH 0.3% | uniswap-v4-ethereum | 0x8023...6c38 | 0.23968457708704 |
| AGIX / FET 1% | uniswap_v3 | 0x6e22...3193 | 0.238305173124405 |
| rust / FET 0.3% | uniswap-v4-ethereum | 0xee71...0bc6 | 0.239902347661801 |
| FET / ETH 1% | uniswap-v4-ethereum | 0x3d8a...9528 | 0.237918804044905 |
| FET / MTLX | uniswap_v2 | 0x6c52...b8b9 | 0.237539491318027 |
| FET / WETH | uniswap_v2 | 0x4042...330b | 0.23476623848405 |
| FET / VVV | uniswap_v2 | 0x332c...0469 | 0.236969041621058 |
| FET / ETH 90% | uniswap-v4-ethereum | 0x178c...48bb | 0.5715364033 |
| FET / USDT 70% | uniswap-v4-ethereum | 0xf408...ca9f | 0.4901240851 |
| FET / USDT 70.1% | uniswap-v4-ethereum | 0x913f...97fe | 0.1888153227 |
| CUDOS / FET 5% | uniswap-v4-ethereum | 0x94d5...7ddf | 0.5053865404 |
| FET / ZIK 1% | uniswap-v4-ethereum | 0xc030...8faf | 0.237358360535227 |
| FET / USDT 1% | uniswap-v4-ethereum | 0x20a7...d2cd | 0.3292084047 |
| FET / WBTC 1% | uniswap_v3 | 0xd81b...cafd | 0.7626552227 |
| OCEAN / FET 1% | uniswap-v4-ethereum | 0x7143...5cb6 | 0.4808817919 |
| AGIX / FET 1% | uniswap-v4-ethereum | 0x900c...1c65 | 0.4977687955 |
| USDC / FET 1% | uniswap-v4-ethereum | 0x3e5f...2030 | 0.5844522885 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.