| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| FRONT / USDT | uniswap_v2 | 0x0138...520e | 0.01421164749 |
| FRONT / WETH | sakeswap | 0x7af5...d258 | 0.01465132324 |
| FRONT / DUSD | uniswap_v2 | 0xaeb0...3ee3 | 0.01458355246 |
| FRONT / USDT | sushiswap | 0x98c2...ceb2 | 0.01436439568 |
| FRONT / WETH | uniswap_v2 | 0x2ea2...ebc0 | 0.01426021953 |
| FRONT / USDT | sakeswap | 0xaded...992c | 0.01415771279 |
| USDF1 / FRONT | uniswap_v2 | 0xe1f9...4a6a | 0.01434912794 |
| SAKE / FRONT | sakeswap | 0xdfc8...784e | 0.0141455666 |
| FRONT / LUA | uniswap_v2 | 0x5c47...393e | 0.02244536791 |
| FRONT / WETH | sushiswap | 0x22ae...e7ea | 0.02582283058 |
| KABOSU / FRONT | uniswap_v2 | 0x2707...564e | 0.710963212423769 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.