| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| BCAT / WETH | uniswap_v2 | 0x0afd...9de5 | 0.000382870134416513 |
| BCAT / SPX | uniswap_v2 | 0x0660...7455 | 0.000381786681890107 |
| BCAT / HOBA 1% | uniswap-v4-ethereum | 0xfbf3...e44d | 0.0004678340941 |
| BCAT / BITCOIN 1% | uniswap-v4-ethereum | 0x7494...9a2c | 0.000476818087271236 |
| BCAT / BITCOIN 1% | uniswap_v3 | 0xf2c5...a7c7 | 0.00047763409554602 |
| BCAT / WETH 1% | uniswap_v3 | 0xca86...0227 | 0.002488587179 |
| CULT / BCAT 1% | uniswap_v3 | 0x380e...92d8 | 0.005553912178 |
| BCAT / HOBA 1% | uniswap_v3 | 0x3653...a4f5 | 0.002376734995 |
| BCAT / APU | uniswap_v2 | 0x7995...fddf | 0.0004264261128 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.