| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| FLOKI / WETH | uniswap_v2 | 0xca7c...78c0 | 0.0000328205565834804 |
| SKOL / FLOKI | uniswap_v2 | 0x4e5c...9b07 | 0.0000329814706640588 |
| BUILD / FLOKI | radioshack_ethereum | 0x7df2...91de | 0.0000289304320848081 |
| FLOKI / ZIK 1% | uniswap_v3 | 0x6199...565c | 0.000029002537611276 |
| FLOKI / WETH 1% | uniswap_v3 | 0xe415...8ce1 | 0.0000328042883474586 |
| FLOKI0.5 / FLOKI | uniswap_v2 | 0xdb88...bbf6 | 0.00004812256754 |
| TEO / FLOKI | uniswap_v2 | 0xe2a9...158f | 0.0000323488743011993 |
| FLOKI0.5 / FLOKI | uniswap_v2 | 0xeebd...c503 | 0.0000415841179450081008956567994424028893868546441141404547684612471495770702284871300821198 |
| DFI / FLOKI | uniswap_v2 | 0xe070...0d39 | 0.00009863058307 |
| FLOKIFI / FLOKI | uniswap_v2 | 0x92ee...210d | 0.0000382692979311462180198116289559986667374324549569538911122398183785391147599585147989910544 |
| Floki 0.5 / FLOKI | uniswap_v2 | 0x429d...555d | 0.0000379282246096588391805899412749459869655998260556880832660763943079639811163609226383248032 |
| BabyDoge / FLOKI | uniswap_v2 | 0xb0e3...6cfc | 0.0000357382694437519 |
| BBC / FLOKI | 9inch-ethereum | 0x9c7c...0c51 | 0.0000343580627112812 |
| FLOKI / WETH 1% | pancakeswap-v3-ethereum | 0x2f01...76dc | 0.570666230340138 |
| PEPE / FLOKI | uniswap_v2 | 0xb190...1044 | 0.0000357778756490555 |
| SIMP / FLOKI | uniswap_v2 | 0x6538...9c32 | 0.0001297291505 |
| RADIO / FLOKI | radioshack_ethereum | 0x3cd8...64ba | 0.00004430589781 |
| FLOKI / USDC 0.05% | uniswap_v3 | 0x9725...82f3 | 0.000248631843162377 |
| SOKU / FLOKI 1% | uniswap_v3 | 0x56b4...dd68 | 0.0000341220606910616 |
| FLOKI / USDT 0.3% | uniswap_v3 | 0xf06b...04a1 | 0.0000558442219 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.