Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
SUSHI / WETH | sushiswap | 0x7950...1fb0 | 0.597315564227526 |
WETH / SUSHI | uniswap_v2 | 0xce84...9433 | 0.58823868293409 |
SUSHI / FRAX | sushiswap | 0xe06f...8a6a | 0.59426254807537 |
SUSHI / WETH 0.3% | sushiswap-v3-ethereum | 0x87c7...5aa2 | 0.587247117131624 |
SUSHI / WETH 1% | uniswap_v3 | 0x19e2...20aa | 0.587265740046363 |
ZIK / SUSHI 1% | sushiswap-v3-ethereum | 0x01b9...c52f | 0.586186034070795 |
SUSHI / WETH 0.3% | uniswap_v3 | 0x73a6...dad1 | 0.587803284302078 |
SUSHI / WETH | shibaswap | 0x6cbe...98e9 | 0.59474500082766 |
KIMCHI / SUSHI | uniswap_v2 | 0xc8d0...748d | 0.590459932298279 |
SUSHI / WETH | sakeswap | 0xa425...4ce9 | 0.595613659309721 |
SUSHI / USDC | sushiswap | 0xba87...b298 | 0.590012014431551 |
DAI / SUSHI | sushiswap | 0x7ee3...4d0a | 0.589521956021113 |
BACON / SUSHI | uniswap_v2 | 0x8f75...11ca | 0.611947569639792 |
VVV / SUSHI | uniswap_v2 | 0x332a...0c9f | 0.611947569639792 |
AAVE / UNI / SUSHI / MKR / COMP / SNX / GRT / CRV 0.5% | balancer_ethereum | 0x3b40...b280 | 169.844747157082 |
AAVE / YFI / UNI / SUSHI / MKR / BAL / COMP / WETH 0.15% | balancer_ethereum | 0x01ab...a163 | 114.710829198753 |
AAVE / UNI / SUSHI / MKR / BAL / COMP / SNX / WETH 0.5% | balancer_ethereum | 0xb6b9...468a | 176.4875256594 |
PUTIN / SUSHI 0.3% | sushiswap-v3-ethereum | 0x5f4e...32af | 0.590493906637678 |
CHAMP / SUSHI 0.3% | uniswap_v3 | 0x25db...c605 | 1.4536778384 |
xSUSHI / SUSHI 1% | uniswap_v3 | 0x9391...9b7e | 0.618422700518781 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.