| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| FBTC / WBTC 0.3% | uniswap_v3 | 0x9dbe...5232 | 72835.1480984369 |
| tacBTC / cbBTC / FBTC | curve | 0xfff8...b9fe | 77844.075129862 |
| SolvBTC / FBTC | uniswap_v2 | 0xbc15...f283 | 66833.7839334014 |
| FBTC / WBTC 0.01% | uniswap_v3 | 0xfb82...825f | 119497.719264001 |
| pumpBTC.bera / FBTC | uniswap_v2 | 0xbafc...9617 | 100937.74725707 |
| FBTC / WBTC | uniswap_v2 | 0xa259...62ff | 97653.2566738219 |
| FBTC / WETH 0.3% | uniswap_v3 | 0x70a3...c33e | 58617.9935841903 |
| pumpBTC.bera / FBTC 0.3% | uniswap_v3 | 0x0614...6488 | 108848.606677661 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.