Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
mevETH / WETH 1% | balancer_ethereum | 0x05b1...8cc4 | 1506.68551298315 |
mevETH / FOLD 0.3% | balancer_ethereum | 0x82e8...f044 | 1760.5298410089 |
frxETH / mevETH | curve | 0xf1b0...2a80 | 1752.3175295166 |
mevETH / WETH | curve | 0x429c...dfad | 1483.2092130835 |
mevETH / WETH 0.02% | balancer_ethereum | 0xb3b6...9867 | 3131.9609655253 |
mevETH / FOLD 0.3% | balancer_ethereum | 0x58b6...cb4a | 1577.8805400137 |
mevETH / WETH 0.3% | uniswap_v3 | 0x441a...36e3 | 2492.04336002868 |
mevETH / WETH 1% | uniswap_v3 | 0xdebe...89b0 | 2273.052338813 |
mevETH / CRETH2 0.3% | uniswap_v3 | 0x352c...55cc | 1556.19093044416 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.