Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
wstETH / AAVE 0.5% | balancer_ethereum | 0x3de2...9f29 | 322.977646916767 |
AAVE / WETH 0.3% | uniswap_v3 | 0x5ab5...c1bb | 322.59362027744 |
AAVE / UNI 0.3% | uniswap_v3 | 0x59c3...4756 | 322.44243897271 |
AAVE / USDC 0.3% | uniswap_v3 | 0xdcea...d706 | 324.255798840038 |
AAVE / LINK 0.3% | uniswap_v3 | 0x1424...528a | 323.717072020412 |
ETH / AAVE 0.3% | uniswap-v4-ethereum | 0x1c60...5088 | 323.823005889512 |
AAVE / PENDLE 0.3% | uniswap-v4-ethereum | 0x8772...cf50 | 323.872155664083 |
1INCH / AAVE 1% | uniswap_v3 | 0xcb65...2c3a | 322.22834662464 |
AAVE / WBTC 0.01% | uniswap-v4-ethereum | 0xe903...e226 | 322.963084040624 |
stkAAVE / AAVE 0.3% | uniswap-v4-ethereum | 0x1393...e0e1 | 322.779989849976 |
AAVE / USDC 0.3% | uniswap-v4-ethereum | 0x2187...7ef8 | 322.462709623912 |
AAVE / ETH 0.275% | uniswap-v4-ethereum | 0xd3a8...472c | 322.933993521538 |
MORPHO / AAVE 0.3% | uniswap_v3 | 0x3687...a997 | 322.701313129379 |
AAVE / WETH 0.25% | balancer-v3-ethereum | 0x9d1f...1f4d | 323.036348249492 |
AAVE / USDT 0.3% | uniswap_v3 | 0x4d1a...5a42 | 322.666311017564 |
AAVE / WETH | uniswap_v2 | 0xdfc1...044f | 322.746237774795 |
AAVE / WETH | sushiswap | 0xd75e...57b4 | 322.560389445962 |
stkAAVE / AAVE 0.3% | uniswap_v3 | 0x1a76...3fbd | 319.750960079783 |
USDP / AAVE | uniswap_v2 | 0x139b...a816 | 322.410615269447 |
waEthLidoWETH / AAVE 0.25% | balancer-v3-ethereum | 0x6cc9...74a1 | 321.882362677034 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.