Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
FET / WETH 1% | uniswap_v3 | 0x948b...a052 | 0.74259178961417 |
FET / ETH 0.3% | uniswap-v4-ethereum | 0x8023...6c38 | 0.743658078441809 |
FET / WETH 0.3% | uniswap_v3 | 0x7441...5377 | 0.746476792143336 |
rust / FET 0.3% | uniswap-v4-ethereum | 0xee71...0bc6 | 0.74259178961417 |
FET / MTLX | uniswap_v2 | 0x6c52...b8b9 | 0.76542158830882 |
AGIX / FET 1% | uniswap_v3 | 0x6e22...3193 | 0.747356978372482 |
FET / WBTC 1% | uniswap_v3 | 0xd81b...cafd | 0.743963705305909 |
FET / WETH | uniswap_v2 | 0x4042...330b | 0.75521286950327 |
USDC / FET 0.3% | uniswap_v3 | 0x8d83...566b | 0.747487885700515 |
OCEAN / FET 1% | uniswap_v3 | 0x2f91...45f5 | 0.857785917366808 |
CUDOS / FET 5% | uniswap-v4-ethereum | 0x94d5...7ddf | 0.5053865404 |
FET / VVV | uniswap_v2 | 0x332c...0469 | 0.8701051586 |
OCEAN / FET 1% | uniswap-v4-ethereum | 0x7143...5cb6 | 0.4808817919 |
AGIX / FET 1% | uniswap-v4-ethereum | 0x900c...1c65 | 0.4977687955 |
FET / USDT 1% | uniswap_v3 | 0x4ff2...2950 | 1.1854689337 |
FET / USDC 1% | uniswap_v3 | 0xc931...c573 | 1.41577775669732 |
FET / WBTC 0.3% | uniswap_v3 | 0x96f3...4f54 | 0.247648619255569 |
USDC / FET 0.05% | uniswap-v4-ethereum | 0xde9a...f501 | 0.7303795889 |
APE / FET 1% | uniswap_v3 | 0x5c7f...7824 | 0.243537283434399 |
ELON / FET 1% | uniswap_v3 | 0xdfca...2c8f | 2.62130544117845 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.