| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| BCAT / WETH | uniswap_v2 | 0x0afd...9de5 | 0.000522806228325254 |
| BCAT / SPX | uniswap_v2 | 0x0660...7455 | 0.000521394305471344 |
| BCAT / APU | uniswap_v2 | 0x7995...fddf | 0.000521573546327998 |
| BCAT / HOBA 1% | uniswap-v4-ethereum | 0xfbf3...e44d | 0.000512581950543672 |
| BCAT / BITCOIN 1% | uniswap-v4-ethereum | 0x7494...9a2c | 0.00050737772398204 |
| BCAT / BITCOIN 1% | uniswap_v3 | 0xf2c5...a7c7 | 0.0006553769539 |
| BCAT / WETH 1% | uniswap_v3 | 0xca86...0227 | 0.002488587179 |
| CULT / BCAT 1% | uniswap_v3 | 0x380e...92d8 | 0.005553912178 |
| BCAT / HOBA 1% | uniswap_v3 | 0x3653...a4f5 | 0.002376734995 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.