| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| FOFAR / WETH | uniswap_v2 | 0x8a9b...6f7a | 0.000000501513597002911 |
| BOYS / FOFAR 0.3% | uniswap-v4-ethereum | 0xdbfd...eee7 | 0.00000113116655 |
| USDT / FOFAR 0.3% | uniswap-v4-ethereum | 0x2a1c...14af | 0.000001617895279 |
| USDT / FOFAR 1% | uniswap-v4-ethereum | 0x762a...7522 | 0.000001189423754 |
| WOLF / FOFAR 0.3% | uniswap-v4-ethereum | 0xd9e7...c6e1 | 0.000001010484963 |
| USDT / FOFAR 0.05% | uniswap-v4-ethereum | 0x4af4...f52a | 0.0000007199771089 |
| TrumpBucks / FOFAR 1% | uniswap_v3 | 0x1127...65de | 0.000000508237366600853 |
| WOLF / FOFAR 1% | uniswap-v4-ethereum | 0xbf1f...4cde | 0.000001108416546 |
| WOLF / FOFAR 1.5% | uniswap-v4-ethereum | 0xf45e...b761 | 0.000001160748727 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.