| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| SUSHI / WETH 0.3% | sushiswap-v3-ethereum | 0x87c7...5aa2 | 0.210825661 |
| SUSHI / WETH | sushiswap | 0x7950...1fb0 | 0.2109055165 |
| WETH / SUSHI | uniswap_v2 | 0xce84...9433 | 0.210888419248749 |
| SUSHI / FRAX | sushiswap | 0xe06f...8a6a | 0.2108090557 |
| ZIK / SUSHI 1% | sushiswap-v3-ethereum | 0x01b9...c52f | 0.208064808666659 |
| SUSHI / WETH 0.3% | uniswap_v3 | 0x73a6...dad1 | 0.2091450801 |
| SUSHI / WETH | shibaswap | 0x6cbe...98e9 | 0.2079796808 |
| SUSHI / WETH 0.01% | sushiswap-v3-ethereum | 0x061a...a663 | 0.2081609519 |
| BURN / SUSHI | sushiswap | 0x489a...794c | 0.210389721557441 |
| SUSHI / USDC | sushiswap | 0xba87...b298 | 0.20652635 |
| SUSHI / USDT | sushiswap | 0x680a...4026 | 0.2081082052 |
| DAI / SUSHI | sushiswap | 0x7ee3...4d0a | 0.207639374986325 |
| AAVE / UNI / SUSHI / MKR / COMP / SNX / GRT / CRV 0.5% | balancer_ethereum | 0x3b40...b280 | 174.656015088 |
| AAVE / SUSHI 1% | uniswap_v3 | 0xb651...c4b1 | 0.211856219006697 |
| AAVE / YFI / UNI / SUSHI / MKR / BAL / COMP / WETH 0.15% | balancer_ethereum | 0x01ab...a163 | 115.5084711208 |
| MATIC / SUSHI | sushiswap | 0x7a2f...b9c3 | 0.208137152673978 |
| AAVE / UNI / SUSHI / MKR / BAL / COMP / SNX / WETH 0.5% | balancer_ethereum | 0xb6b9...468a | 113.0032832177 |
| 1INCH / BNT / UNI / SUSHI / TrumpBucks / FRAX / USDC / sdBal 0.3% | balancer-v3-ethereum | 0xc3b1...4959 | 0.136063046 |
| 1INCH / SUSHI | sushiswap | 0x337b...e4ed | 0.209609883401215 |
| INDEX / 1INCH / UNI / LINK / GNO / SUSHI / TrumpBucks / ALCX 0.3% | balancer-v3-ethereum | 0x6378...d00d | 0.2693688611 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.