Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
BCAT / WETH | uniswap_v2 | 0x0afd...9de5 | 0.00124435472026971 |
BCAT / SPX | uniswap_v2 | 0x0660...7455 | 0.00124063701369314 |
BCAT / APU | uniswap_v2 | 0x7995...fddf | 0.0012287430218209 |
BCAT / HOBA 1% | uniswap_v3 | 0x3653...a4f5 | 0.00128307411441578 |
BCAT / BITCOIN 1% | uniswap_v3 | 0xf2c5...a7c7 | 0.00122408280219091 |
BCAT / WETH 1% | uniswap_v3 | 0xca86...0227 | 0.002218697312 |
CULT / BCAT 1% | uniswap_v3 | 0x380e...92d8 | 0.005553912178 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.