| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| FDT / gOHM | sushiswap | 0x75b0...45c1 | 0.00131744756860699 |
| FDT / WETH 1% | balancer_ethereum | 0x2d34...fe86 | 0.00131603982214174 |
| OHM / FDT 1% | balancer_ethereum | 0xfb46...a79a | 0.00121176247230638 |
| OHM / FDT 1% | uniswap_v3 | 0xc172...03cb | 0.005133318695 |
| FDT / USDC | sushiswap | 0xef93...142f | 0.0004355114249 |
| FDT / WETH | sushiswap | 0xe4b2...3904 | 0.0000009852562822 |
| FDT / wsOHM | sushiswap | 0x2e30...bbba | 0.0 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.