| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| KFT / WETH | uniswap_v2 | 0x54db...1c45 | 0.00022483936381857 |
| USDC / KFT 88% | uniswap-v4-ethereum | 0x183d...e4bd | 0.0001937838252 |
| USDT / KFT 90% | uniswap-v4-ethereum | 0x5d20...7a97 | 0.0001733670466 |
| UFARM / KFT | uniswap_v2 | 0xc9ec...5b2e | 0.001809608401 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.