Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
CAW / WETH | uniswap_v2 | 0x48d2...2daa | 0.0000000584095630338236 |
QOM / O / CAW | curve | 0x84ce...a178 | 0.00000000408828309007145 |
CAW / ETH 1% | uniswap-v4-ethereum | 0xf9e4...292e | 0.0000000579979957003574 |
CAW / WETH 1% | uniswap_v3 | 0x92ff...a7e3 | 0.0000000624673168013756 |
CAW / WETH | curve | 0xe8d6...847a | 0.0000000607262572549687 |
DOGS / CAW 1% | uniswap_v3 | 0xf4a1...413b | 0.0000000597686307724589 |
DOGS / CAW 0.01% | uniswap_v3 | 0x2792...04d5 | 0.0000000586195736612437 |
KOO / CAW 1% | uniswap_v3 | 0x9e08...38a4 | 0.0000000733408768654205031468428487203 |
QOM / O / CAW 1% | balancer_ethereum | 0xb704...858d | 0.000000003726402568 |
CAW / TREAT 1% | uniswap_v3 | 0x41fc...883a | 0.0000000627032881345732 |
BCUT / CAW 0.01% | uniswap-v4-ethereum | 0xb9af...3686 | 0.0000000447979097 |
CAW / TREAT 1% | uniswap-v4-ethereum | 0xb4c4...2a99 | 0.000000061747822558969 |
WCAW / CAW 0.3% | uniswap-v4-ethereum | 0x828d...1b9c | 0.00000003970238163 |
BEARDY / CAW 0.3% | uniswap_v3 | 0x0045...c3f5 | 0.00000005509058017 |
DOGS / CAW 0.3% | uniswap-v4-ethereum | 0xa0e5...033d | 0.00000005558256353 |
WCAW / CAW 1% | uniswap_v3 | 0xe890...c2dc | 0.00000004196787534 |
CAW / USDC | uniswap_v2 | 0x7a80...411e | 0.00000005449815199 |
CAW / USDC 1% | uniswap_v3 | 0xd862...87fd | 0.000000057778894829499 |
CAW / WETH 0.3% | uniswap_v3 | 0xc0fb...ca22 | 0.00000009066525794 |
CAW / DAI | uniswap_v2 | 0xb184...e476 | 0.00000003357179616 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.