Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
RATO / WETH | uniswap_v2 | 0x8d02...e307 | 0.00000803936455630995 |
RATO / WETH 1% | uniswap_v3 | 0x41b5...e384 | 0.00000802779737188636 |
RATO / ETH 1% | uniswap-v4-ethereum | 0xf55f...bf17 | 0.00000807440707269707 |
RATO / WETH 0.3% | uniswap_v3 | 0x8d2b...6af1 | 0.00000811210739841174 |
USDT / RATO 1% | uniswap-v4-ethereum | 0x0730...4e7e | 0.00005036443985 |
RATO / ETH 10% | uniswap-v4-ethereum | 0x2467...c06e | 0.00003300492753 |
RATO / ETH 2% | uniswap-v4-ethereum | 0x86a2...b8ff | 0.00003528777401 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.