| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| crvUSD / frxETH / Silo | curve | 0x86bf...a1d3 | 0.992559931033447 |
| Silo / FRAX | curve | 0x9a22...65eb | 0.00889749888795274432532624446659218673039130020091241425042658427 |
| Silo / ETH 90% | uniswap-v4-ethereum | 0xfe5f...1916 | 0.004027458858 |
| Silo / WETH 0.05% | uniswap_v3 | 0xe0ac...d55d | 0.03803269571 |
| Silo / WETH 0.3% | balancer_ethereum | 0x4860...8f87 | 0.00950266701516585 |
| Silo / WETH 1% | balancer_ethereum | 0x9cc6...19dd | 0.009449994294 |
| Silo / WETH 1% | uniswap_v3 | 0x1c90...cd45 | 0.04524575179 |
| Silo / USDC 1% | uniswap_v3 | 0xe349...d55e | 0.0570759950097561 |
| Silo / fETH | curve | 0xc1bf...9e38 | 0.008884105703 |
| Silo / USDC 0.3% | uniswap_v3 | 0xabd2...bdf8 | 0.0401809277603365 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.