| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| CAT'N / WETH | uniswap_v2 | 0x2337...6271 | 0.000001653819914 |
| CAT'N / USDT | uniswap_v2 | 0x8ec3...144c | 0.000001624382284 |
| CAT'N / LINK | uniswap_v2 | 0xf58a...3fe6 | 0.000001657650822 |
| CAT'N / USDC | uniswap_v2 | 0x7027...ac7e | 0.000001620846748 |
| CAT'N / USDT | pancakeswap_ethereum | 0xdd46...d71b | 0.00000158588530416905 |
| CAT'N / TKP | uniswap_v2 | 0xa065...a564 | 0.00000167346081 |
| CAT'N / UNI | uniswap_v2 | 0xec3b...4886 | 0.00000153837377 |
| Cake / CAT'N | pancakeswap_ethereum | 0xf32e...b8a4 | 0.000001510531717 |
| CAT'N / DAI | uniswap_v2 | 0x8336...1c9a | 0.000001677745144 |
| CAT'N / DEXT | uniswap_v2 | 0x10b5...96c4 | 0.000001658405084 |
| CAT'N / TRI | uniswap_v2 | 0x6f05...e4ef | 0.000002009409898 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.