| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| CAW / WETH | uniswap_v2 | 0x48d2...2daa | 0.0000000369271311542127 |
| QOM / O / CAW | curve | 0x84ce...a178 | 0.00000000193256433200603 |
| CAW / WETH | curve | 0xe8d6...847a | 0.0000000373955805624443 |
| CAW / TREAT 1% | uniswap-v4-ethereum | 0xb4c4...2a99 | 0.0000000362775541036078 |
| CAW / WETH 1% | uniswap_v3 | 0x92ff...a7e3 | 0.0000000367943428542759 |
| DOGS / CAW 1% | uniswap_v3 | 0xf4a1...413b | 0.0000000378223253251704 |
| QOM / O / CAW 1% | balancer_ethereum | 0xb704...858d | 0.000000001921419105 |
| DOGS / CAW 0.01% | uniswap_v3 | 0x2792...04d5 | 0.0000000396534562502611 |
| BCUT / CAW 0.01% | uniswap-v4-ethereum | 0xb9af...3686 | 0.0000000447979097 |
| WCAW / CAW 0.3% | uniswap-v4-ethereum | 0x828d...1b9c | 0.00000003970238163 |
| CAW / ETH 1% | uniswap-v4-ethereum | 0xf9e4...292e | 0.00000004992082217 |
| BEARDY / CAW 0.3% | uniswap_v3 | 0x0045...c3f5 | 0.00000004073360959 |
| DOGS / CAW 0.3% | uniswap-v4-ethereum | 0xa0e5...033d | 0.00000004200784416 |
| CAW / USDC | uniswap_v2 | 0x7a80...411e | 0.0000000391874173747318 |
| WCAW / CAW 1% | uniswap_v3 | 0xe890...c2dc | 0.00000004196787534 |
| CAW / USDC 1% | uniswap_v3 | 0xd862...87fd | 0.0000000395815847026721 |
| CAW / DAI | uniswap_v2 | 0xb184...e476 | 0.00000006853090521 |
| CAW / TREAT 1% | uniswap_v3 | 0x41fc...883a | 0.00000005522987313 |
| SIGMA / CAW 0.3% | uniswap-v4-ethereum | 0xd137...f695 | 0.000000040652014 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.