| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| OHM / FDT 1% | balancer_ethereum | 0xfb46...a79a | 0.00102764271542535 |
| FDT / WETH 1% | balancer_ethereum | 0x2d34...fe86 | 0.001027561707 |
| FDT / gOHM | sushiswap | 0x75b0...45c1 | 0.001043892795 |
| OHM / FDT 1% | uniswap_v3 | 0xc172...03cb | 0.005133318695 |
| FDT / USDC 1% | uniswap_v3 | 0x5681...6078 | 0.0647792178423005 |
| FDT / USDC | sushiswap | 0xef93...142f | 0.00105885248 |
| FDT / WETH 1% | uniswap_v3 | 0x37f0...66bd | 0.00434407495832805 |
| FDT / WETH | sushiswap | 0xe4b2...3904 | 0.001359714416 |
| FDT / USDT 1% | uniswap_v3 | 0x2532...6575 | 0.00416057422405715029807350171738 |
| FDT / wsOHM | sushiswap | 0x2e30...bbba | 0.0 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.