| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ENA / WETH 0.3% | uniswap_v3 | 0xc3db...ea18 | 0.1047902403 |
| ENA / sENA 0.3% | uniswap_v3 | 0x0598...7e26 | 0.1105377813 |
| ENA / sENA 0.05% | uniswap_v3 | 0x6bbb...bcde | 0.1056276397 |
| ETH / ENA 0.3% | uniswap-v4-ethereum | 0x5b29...3409 | 0.104384370370912 |
| ENA / sENA 0.174% | uniswap-v4-ethereum | 0xe771...30fb | 0.1107822392 |
| ENA / WETH 0.05% | uniswap_v3 | 0xae40...5a88 | 0.1045432758 |
| ENA / USDC 1% | uniswap-v4-ethereum | 0xd9b6...c3cb | 0.1045960238 |
| ENA / USDC 0.3% | uniswap-v4-ethereum | 0x8c52...b147 | 0.1048103671 |
| rust / ENA 1% | uniswap-v4-ethereum | 0x93b3...676a | 0.104430751606944 |
| ENA / WETH 1% | uniswap_v3 | 0x08b8...2c00 | 0.1047352724 |
| ENA / WETH 1% | pancakeswap-v3-ethereum | 0x413d...060f | 0.1052787417 |
| ENA / USDT | uniswap_v2 | 0xfc6b...2d69 | 0.1103896016 |
| ENA / COMP 1% | uniswap-v4-ethereum | 0xe48f...87ed | 0.1079770671 |
| ENA / USDT 0.05% | uniswap_v3 | 0xecd0...cec5 | 0.2709047679 |
| ENA / sENA 0.01% | uniswap-v4-ethereum | 0x5bac...af28 | 0.5629071993 |
| ENA / ETH 0.03% | uniswap-v4-ethereum | 0x1226...8822 | 0.2709202585 |
| ENA / sENA 0.105% | uniswap-v4-ethereum | 0xc2f1...5832 | 0.2789339614 |
| ENA / ETH 0.2% | uniswap-v4-ethereum | 0xe487...f2bf | 0.2703817364 |
| ENA / sENA 0.12% | uniswap-v4-ethereum | 0x1b1a...4cf3 | 0.2887334038 |
| ENA / sENA 0.1% | uniswap-v4-ethereum | 0x1809...89be | 0.2308360999 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.