| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| FRONT / DUSD | uniswap_v2 | 0xaeb0...3ee3 | 0.0218959516825235 |
| FRONT / WETH | uniswap_v2 | 0x2ea2...ebc0 | 0.0220071127316244 |
| FRONT / USDT | sushiswap | 0x98c2...ceb2 | 0.0223710769035262 |
| FRONT / USDT | uniswap_v2 | 0x0138...520e | 0.0225435045350561 |
| FRONT / USDT | sakeswap | 0xaded...992c | 0.02218457262 |
| USDF1 / FRONT | uniswap_v2 | 0xe1f9...4a6a | 0.02175437722 |
| FRONT / WETH | sakeswap | 0x7af5...d258 | 0.02267417749 |
| SAKE / FRONT | sakeswap | 0xdfc8...784e | 0.02227080131 |
| FRONT / LUA | uniswap_v2 | 0x5c47...393e | 0.02244536791 |
| FRONT / WETH | sushiswap | 0x22ae...e7ea | 0.02582283058 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.