Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
CAW / WETH | uniswap_v2 | 0x48d2...2daa | 0.0000000503916430915966 |
CAW / WETH 1% | uniswap_v3 | 0x92ff...a7e3 | 0.0000000500063945025281 |
QOM / O / CAW | curve | 0x84ce...a178 | 0.00000000189675083467808 |
DOGS / CAW 1% | uniswap_v3 | 0xf4a1...413b | 0.0000000503937336388115 |
CAW / WETH | curve | 0xe8d6...847a | 0.0000000496472592296382 |
CAW / TREAT 1% | uniswap-v4-ethereum | 0xb4c4...2a99 | 0.000000048909802776449 |
WCAW / CAW 1% | uniswap_v3 | 0xe890...c2dc | 0.00000004196787534 |
CAW / TREAT 1% | uniswap_v3 | 0x41fc...883a | 0.0000000492161845890334 |
KOO / CAW 1% | uniswap_v3 | 0x9e08...38a4 | 0.0000000733408768654205031468428487203 |
QOM / O / CAW 1% | balancer_ethereum | 0xb704...858d | 0.000000002093365041 |
BCUT / CAW 0.01% | uniswap-v4-ethereum | 0xb9af...3686 | 0.0000000447979097 |
BEARDY / CAW 0.3% | uniswap_v3 | 0x0045...c3f5 | 0.0000000494480204301152 |
CAW / USDC | uniswap_v2 | 0x7a80...411e | 0.0000000464997464041931 |
CAW / USDC 1% | uniswap_v3 | 0xd862...87fd | 0.0000000465420773275646 |
CAW / WETH 0.3% | uniswap_v3 | 0xc0fb...ca22 | 0.00000009066525794 |
CAW / DAI | uniswap_v2 | 0xb184...e476 | 0.00000003357179616 |
CAW / USDC 0.3% | uniswap_v3 | 0x7120...1aad | 0.000000060808351186448 |
MILAREPA / CAW | uniswap_v2 | 0x33da...f7aa | 0.0000000733113315880073676832583785298620400534073154307668303350655988410237596407480003865026748 |
BK / CAW | uniswap_v2 | 0x2163...3aed | 0.0000000514926439850068 |
Kitsune / CAW | uniswap_v2 | 0x8b8b...cbba | 0.0000000516337723307352422562002206150897687360151855113739632230577174883638792565216861223778472 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.