| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| WETH / YFI | curve | 0xc26b...54ba | 3496.93287655482 |
| YFI / WETH | sushiswap | 0x088e...4d0c | 3530.19299151378 |
| YFI / WETH | uniswap_v2 | 0x2fdb...6e28 | 3530.19301437932 |
| YFI / WETH 0.3% | uniswap_v3 | 0x0491...4287 | 3538.06390656649 |
| coveYFI / YFI | curve | 0xa3f1...9760 | 3310.44869180891 |
| sdYFI / YFI | curve | 0x852b...9cc8 | 3310.44869180891 |
| sil / YFI | sushiswap | 0x41ca...345c | 3500.50012862547 |
| YFI / silv2 | sushiswap | 0x1770...6749 | 3489.87531423825 |
| YFI / WETH 1% | uniswap_v3 | 0x2e8d...deb2 | 3509.65191649479 |
| ABYSS / YFI | uniswap_v2 | 0xeeab...5d6d | 3495.11320280389 |
| ONIGIRI / YFI | uniswap_v2 | 0x1b58...4188 | 3489.9875733218 |
| ETHMNY / YFI | sushiswap | 0x6a3b...5076 | 3489.9875733218 |
| YFI / WETH 0.75% | balancer_ethereum | 0x1860...ee9e | 3492.75737742363 |
| YFI / WETH | sakeswap | 0x89ba...38d9 | 3513.2790691698 |
| sdYFI / YFI | curve | 0x79e2...aebe | 3310.44869180891 |
| YFI / WETH | defi_swap | 0x50cf...b180 | 3437.68385386313 |
| WOOFY / YFI | sushiswap | 0x0780...20a7 | 3522.92425908865 |
| gKIMCHI / YFI | uniswap_v2 | 0x090b...cac0 | 3522.92413536129 |
| MATIC / YFI / AAVE / MKR / BAL / COMP / SNX / WETH 1% | balancer_ethereum | 0x9e7f...892d | 3429.0231622319 |
| CRO / YFI | defi_swap | 0x43ba...a6b1 | 3503.96124544982 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.