| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| uCAT / WETH 1% | uniswap-v4-ethereum | 0x685d...7f3c | 1333.3161910491 |
| uCAT / ETH 30% | uniswap-v4-ethereum | 0xb79e...f847 | 3160.9548516047 |
| uCAT / ETH 9% | uniswap-v4-ethereum | 0x9b28...353f | 1412.0657789658 |
| uCAT / ETH 28% | uniswap-v4-ethereum | 0x64f2...f100 | 1271.0138914895 |
| uCAT / USDC 10% | uniswap-v4-ethereum | 0x1861...691c | 2063.5387602976 |
| uCAT / ETH 30% | uniswap-v4-ethereum | 0x4dd5...aea9 | 1377.825099409 |
| uCAT / ETH 0.3% | uniswap-v4-ethereum | 0x9645...48f0 | 849.7227821045 |
| uCAT / WETH 1% | uniswap_v3 | 0x7c46...f255 | 2236.2651970317 |
| uCAT / WETH 0.01% | uniswap_v3 | 0x49db...d71d | 869.307822507 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.