| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| RATO / WETH | uniswap_v2 | 0x8d02...e307 | 0.000000305339709659366 |
| RATO / WETH 1% | uniswap_v3 | 0x41b5...e384 | 0.000000314811759989294 |
| RATO / ETH 1% | uniswap-v4-ethereum | 0xf55f...bf17 | 0.000000298942498037351 |
| USDT / RATO 1% | uniswap-v4-ethereum | 0x0730...4e7e | 0.00005036443985 |
| RATO / ETH 10% | uniswap-v4-ethereum | 0x2467...c06e | 0.00003300492753 |
| USDT / RATO 20% | uniswap-v4-ethereum | 0x72e8...b222 | 0.0000002649155424 |
| RATO / ETH 2% | uniswap-v4-ethereum | 0x86a2...b8ff | 0.00003528777401 |
| RATO / WETH 0.3% | uniswap_v3 | 0x8d2b...6af1 | 0.000003663528366 |
| USDC / RATO 1% | uniswap_v3 | 0xaab2...550c | 0.000009576113417 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.