| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| CANA / USDT 0.05% | uniswap-v4-ethereum | 0x9651...c58f | 30.7941497229576 |
| CANA / AJNA | uniswap_v2 | 0x151f...2b54 | 30.7369765351793 |
| CANA / USDT | curve | 0xc823...a677 | 30.79957214 |
| CANA / scrvUSD | uniswap_v2 | 0x8264...c2a8 | 31.5126203127 |
| CANA / USDT 0.3% | uniswap-v4-ethereum | 0x6a6e...d8e8 | 30.4212837749 |
| CANA / USDC 0.05% | uniswap-v4-ethereum | 0xf70b...c9ee | 31.553013009 |
| CANA / cbETH | uniswap_v2 | 0xd1c7...536e | 31.873543113 |
| CANA / cbBTC | uniswap_v2 | 0xb834...e4dc | 30.5969518236 |
| CANA / WOJAK | uniswap_v2 | 0x9b2e...6657 | 31.5600407847 |
| CANA / WETH | uniswap_v2 | 0xc05f...d249 | 31.9428689307 |
| CANA / USDT | uniswap_v2 | 0x4925...831a | 30.9952318206 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.