Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
BADGER / WBTC 0.3% | uniswap_v3 | 0xe15e...a91b | 1.1234628175654 |
BADGER / WBTC | sushiswap | 0x1104...0b4a | 1.12631630420895 |
BADGER / WBTC | uniswap_v2 | 0xcd79...2859 | 1.1263163025549 |
BADGER / WBTC 0.3% | balancer_ethereum | 0xb460...1b36 | 1.12068919760848 |
BADGER / WBTC | curve | 0x50f3...685d | 1.1475854627977 |
BADGER / WETH | uniswap_v2 | 0x9752...00b6 | 1.11788349446675 |
BADGER / WETH 1% | uniswap_v3 | 0x7409...e856 | 1.24573081240551 |
BADGER / rETH 0.25% | balancer_ethereum | 0x1ee4...a0ff | 1.19371951678831 |
BADGER / rETH 0.25% | balancer_ethereum | 0xe340...422e | 1.11720782975487 |
BADGER / EBTC 0.3% | uniswap_v3 | 0x81d9...c0cd | 2.4955055102 |
BADGER / USDT 0.3% | uniswap_v3 | 0xa5a4...7347 | 1.4762212959 |
BADGER / WBTC 0.01% | sushiswap-v3-ethereum | 0x6173...c950 | 1.12471941679972 |
BADGER / WBTC 0.3% | uniswap-v4-ethereum | 0x2838...f315 | 1.6909670436 |
BADGER / crvFRAX | curve | 0x13b8...a113 | 1.14044399968127 |
BADGER / WBTC / graviAURA 0.3% | balancer_ethereum | 0xa0b7...3a10 | 1.0319053808 |
BADGER / WETH | sushiswap | 0x6631...f040 | 1.28142883588126 |
BADGER / graviAURA 0.3% | balancer_ethereum | 0x1ee7...b095 | 0.783799629 |
BADGER / CROPS | uniswap_v2 | 0x27d0...bfc6 | 0.9755175659 |
BADGER / USDC | sushiswap | 0x7a2b...8f16 | 1.2719528129 |
BADGER / DIGG | sushiswap | 0x438f...e000 | 3.34695653998378 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.