| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| SUSHI / WETH | sushiswap | 0x7950...1fb0 | 0.346036060189298 |
| WETH / SUSHI | uniswap_v2 | 0xce84...9433 | 0.344488649077473 |
| SUSHI / WETH 0.3% | sushiswap-v3-ethereum | 0x87c7...5aa2 | 0.346292934863378 |
| AAVE / SUSHI 1% | uniswap_v3 | 0xb651...c4b1 | 0.346010058058951 |
| SUSHI / FRAX | sushiswap | 0xe06f...8a6a | 0.345247318509907 |
| ZIK / SUSHI 1% | sushiswap-v3-ethereum | 0x01b9...c52f | 0.3479821448421 |
| SUSHI / WETH | shibaswap | 0x6cbe...98e9 | 0.350994775030436 |
| SUSHI / WETH 0.3% | uniswap_v3 | 0x73a6...dad1 | 0.347174321335596 |
| KIMCHI / SUSHI | uniswap_v2 | 0xc8d0...748d | 0.348843539907626 |
| UNI / SUSHI 1% | uniswap_v3 | 0x9c3e...86c0 | 0.354613767502159 |
| SUSHI / WETH 0.01% | sushiswap-v3-ethereum | 0x061a...a663 | 0.347543103227214 |
| ZIK / SUSHI 1% | uniswap-v4-ethereum | 0xe960...8884 | 0.345910050508304 |
| ABYSS / SUSHI | uniswap_v2 | 0xc92b...1806 | 0.347375813017783 |
| SUSHI / USDC | sushiswap | 0xba87...b298 | 0.347369733315614 |
| BURN / SUSHI | sushiswap | 0x489a...794c | 0.348352713216049 |
| SUSHI / USDT | sushiswap | 0x680a...4026 | 0.345492419965732 |
| DAI / SUSHI | sushiswap | 0x7ee3...4d0a | 0.347366531984995 |
| KABOSU / SUSHI | uniswap_v2 | 0x4c18...bced | 0.352726036020001 |
| BACON / SUSHI | uniswap_v2 | 0x8f75...11ca | 0.352667629044393 |
| TOM3 / SUSHI 0.3% | uniswap_v3 | 0xd692...3053 | 0.351135846755794 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.