| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| FUND / WETH 1% | uniswap_v3 | 0x8839...56b0 | 0.0118217159057637 |
| xFUND / FUND | shibaswap | 0x16e5...ff82 | 0.0118126388295683 |
| FUND / WETH | saitaswap-ethereum | 0x14f2...ed65 | 0.0109787055514924 |
| FUND / TREAT 1% | uniswap-v4-ethereum | 0xe33f...b4aa | 0.0111571308353073 |
| USDC / FUND 1% | uniswap_v3 | 0xaae6...9bfc | 0.03030118306 |
| FUND / WETH | saitaswap-ethereum | 0x62bd...d1b7 | 0.0110159451533223 |
| 0NE / FUND | uniswap_v2 | 0x5996...bf17 | 0.00747359044 |
| FUND / WETH | uniswap_v2 | 0x500b...07ed | 0.0596590606837207 |
| BONE / FUND | shibaswap | 0xbd23...baea | 0.487084509586747237953466375287905561862882509955207416595388200120606962840178686978374216 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.