Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
MKR / WETH 0.3% | uniswap_v3 | 0xe8c6...e531 | 2048.32643986866 |
MKR / WETH | uniswap_v2 | 0xc2ad...a225 | 2038.94540846062 |
MKR / WETH 0.26% | balancer_ethereum | 0xaac9...86ce | 2064.66389283526 |
MKR / WETH | sushiswap | 0xba13...50dd | 2040.82193700638 |
SKY / MKR 0.3% | uniswap_v3 | 0x881e...db86 | 2052.56699338306 |
DAI / MKR 0.3% | uniswap_v3 | 0x2a84...cba4 | 2043.59381548615 |
sil / MKR | sushiswap | 0xf15e...9dbc | 2074.12575113487 |
LK99 / MKR 0.3% | uniswap_v3 | 0x6536...73c1 | 2029.38798861286 |
ETH / MKR 0.3% | uniswap-v4-ethereum | 0xcde9...d0a8 | 2066.83288536914 |
MKR / WETH 1% | uniswap_v3 | 0x3afd...0316 | 2038.47906851708 |
MKR / HAKKA | uniswap_v2 | 0xb8b8...a6a9 | 2027.7028378381 |
SKY / MKR 1% | uniswap-v4-ethereum | 0xe7f7...4f7c | 2072.37204235963 |
MKR / USDT | uniswap_v2 | 0xa14d...c043 | 2030.26862952365 |
MKR / WETH | defi_swap | 0x46d9...db47 | 2051.22324662524 |
MKR / DAI | uniswap_v2 | 0x517f...fcc8 | 2051.96431737393 |
DAI / MKR | antfarm-ethereum | 0x0969...66f9 | 2382.83334454106 |
ICHI / MKR 0.3% | uniswap_v3 | 0x9c41...17b8 | 636.196697301944 |
SKY / MKR 0.3% | uniswap-v4-ethereum | 0x7077...07b4 | 1749.5761538985 |
AAVE / UNI / SUSHI / MKR / COMP / SNX / GRT / CRV 0.5% | balancer_ethereum | 0x3b40...b280 | 314.019541405527 |
ETH / MKR 1% | uniswap-v4-ethereum | 0x9707...2b94 | 2360.36179469906 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.