Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
SUSHI / WETH | sushiswap | 0x7950...1fb0 | 0.695426230789349 |
WETH / SUSHI | uniswap_v2 | 0xce84...9433 | 0.694740958378598 |
SUSHI / FRAX | sushiswap | 0xe06f...8a6a | 0.692880351918731 |
SUSHI / WETH 0.3% | sushiswap-v3-ethereum | 0x87c7...5aa2 | 0.692223313471431 |
SUSHI / WETH 0.3% | uniswap_v3 | 0x73a6...dad1 | 0.694456710059783 |
SUSHI / WETH | shibaswap | 0x6cbe...98e9 | 0.69357477543931 |
ZIK / SUSHI 1% | sushiswap-v3-ethereum | 0x01b9...c52f | 0.70628634504454 |
SUSHI / WETH | sakeswap | 0xa425...4ce9 | 0.694739948130625 |
KIMCHI / SUSHI | uniswap_v2 | 0xc8d0...748d | 0.696652318542134 |
SUSHI / WETH 0.01% | sushiswap-v3-ethereum | 0x061a...a663 | 0.697306600357157 |
ABYSS / SUSHI | uniswap_v2 | 0xc92b...1806 | 0.696423256973632 |
SUSHI / USDT | sushiswap | 0x680a...4026 | 0.695308143200372 |
SUSHI / USDC | sushiswap | 0xba87...b298 | 0.666668220698256 |
DAI / SUSHI | sushiswap | 0x7ee3...4d0a | 0.699882901161154 |
BURN / SUSHI | sushiswap | 0x489a...794c | 0.705846238827004 |
AAVE / UNI / SUSHI / MKR / COMP / SNX / GRT / CRV 0.5% | balancer_ethereum | 0x3b40...b280 | 169.849088925127 |
UNI / SUSHI | sushiswap | 0xb8b3...fa8b | 0.698791423755517 |
AAVE / UNI / SUSHI / MKR / BAL / COMP / SNX / WETH 0.5% | balancer_ethereum | 0xb6b9...468a | 176.4875256594 |
EDEN / SUSHI | sushiswap | 0x9630...37c7 | 0.682796421563126 |
OOKS / SUSHI | sushiswap | 0x1a97...e01a | 0.693263232860966 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.