| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| CATE / USDT 99.94% | uniswap-v4-ethereum | 0xc104...a1af | 0.00000003364808087 |
| CATE / ETH 97% | uniswap-v4-ethereum | 0x7934...e594 | 0.000476668151 |
| CATE / USDT 95.55% | uniswap-v4-ethereum | 0xcca7...9c52 | 0.000002639293127 |
| CATE / USDT 99.996% | uniswap-v4-ethereum | 0x85cc...1ddf | 0.00000003898332433 |
| CATE / ETH 98% | uniswap-v4-ethereum | 0xcccd...51f4 | 0.0000004095618591 |
| CATE / ETH 95% | uniswap-v4-ethereum | 0x6989...013e | 0.000000005714582809 |
| CATE / USDT 99.91% | uniswap-v4-ethereum | 0x455c...836f | 0.00000009884525314 |
| CATE / ETH 94% | uniswap-v4-ethereum | 0xbef2...e333 | 0.000005223366321 |
| CATE / WETH | uniswap_v2 | 0x5db5...fb29 | 0.003279172411 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.