| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| stkAAVE / AAVE 0.3% | uniswap_v3 | 0x1a76...3fbd | 191.067241815613 |
| stkAAVE / AAVE 0.3% | uniswap-v4-ethereum | 0x1393...e0e1 | 190.701634675189 |
| stkAAVE / WETH 1% | uniswap_v3 | 0x6b14...5697 | 190.187948886291 |
| stkAAVE / FRAX 1% | uniswap_v3 | 0xc65a...2792 | 190.114163347073 |
| stkAAVE / AAVE 1% | uniswap-v4-ethereum | 0xd371...2e5c | 304.2894640239 |
| stkAAVE / AAVE 0.35% | uniswap-v4-ethereum | 0xf228...85cb | 253.8999608048 |
| stkAAVE / AAVE 0.29% | uniswap-v4-ethereum | 0xf69a...ed1a | 222.2359210206 |
| stkAAVE / ETH 1% | uniswap-v4-ethereum | 0xeba8...0bac | 317.9122555225 |
| stkAAVE / AAVE 1% | uniswap_v3 | 0x951e...89f7 | 320.0666001708 |
| stkAAVE / WETH | uniswap_v2 | 0xc049...0df1 | 0.0001780349481 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.