Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
FET / WETH 0.3% | uniswap_v3 | 0x7441...5377 | 0.707707688187349 |
FET / WETH 1% | uniswap_v3 | 0x948b...a052 | 0.717624754554609 |
FET / ETH 0.3% | uniswap-v4-ethereum | 0x8023...6c38 | 0.709578815694553 |
FET / USDC 1% | uniswap_v3 | 0xc931...c573 | 0.707642092467577 |
rust / FET 0.3% | uniswap-v4-ethereum | 0xee71...0bc6 | 0.697650066404639 |
AGIX / FET 1% | uniswap_v3 | 0x6e22...3193 | 0.698336337328196 |
FET / MTLX | uniswap_v2 | 0x6c52...b8b9 | 0.721717281520583 |
OCEAN / FET 1% | uniswap_v3 | 0x2f91...45f5 | 0.701035683894078 |
FET / WBTC 1% | uniswap_v3 | 0xd81b...cafd | 0.718795417878554 |
FET / VVV | uniswap_v2 | 0x332c...0469 | 0.736436100343046 |
FET / WETH | uniswap_v2 | 0x4042...330b | 0.708806126372571 |
CUDOS / FET 5% | uniswap-v4-ethereum | 0x94d5...7ddf | 0.5053865404 |
FET / USDT 1% | uniswap-v4-ethereum | 0x20a7...d2cd | 0.716857176561818 |
FET / wCFG 1% | uniswap-v4-ethereum | 0xdbb0...88fe | 0.740803526646749 |
OCEAN / FET 1% | uniswap-v4-ethereum | 0x7143...5cb6 | 0.4808817919 |
AGIX / FET 1% | uniswap-v4-ethereum | 0x900c...1c65 | 0.4977687955 |
FET / USDT 1% | uniswap_v3 | 0x4ff2...2950 | 1.1782333813 |
USDC / FET 0.3% | uniswap_v3 | 0x8d83...566b | 0.7020916444 |
FET / WBTC 0.3% | uniswap_v3 | 0x96f3...4f54 | 0.247648619255569 |
FET / AEVO 0.3% | uniswap-v4-ethereum | 0xb55d...ea60 | 0.6805290096 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.