Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
MKR / WETH 0.3% | uniswap_v3 | 0xe8c6...e531 | 1401.73658716663 |
MKR / WETH 1% | uniswap_v3 | 0x3afd...0316 | 1392.91569381147 |
MKR / WETH | uniswap_v2 | 0xc2ad...a225 | 1394.30193919306 |
MKR / WETH 0.26% | balancer_ethereum | 0xaac9...86ce | 1387.87212321198 |
MKR / WETH | sushiswap | 0xba13...50dd | 1391.81397385427 |
SKY / MKR 0.3% | uniswap-v4-ethereum | 0x7077...07b4 | 1384.74365481062 |
ETH / MKR 0.3% | uniswap-v4-ethereum | 0xcde9...d0a8 | 1389.35385404072 |
DAI / MKR 0.3% | uniswap_v3 | 0x2a84...cba4 | 1410.47853154983 |
sil / MKR | sushiswap | 0xf15e...9dbc | 1405.22295784326 |
LK99 / MKR 0.3% | uniswap_v3 | 0x6536...73c1 | 1373.23187859009 |
MKR / HAKKA | uniswap_v2 | 0xb8b8...a6a9 | 1385.91820294889 |
AAVE / UNI / SUSHI / MKR / COMP / SNX / GRT / CRV 0.5% | balancer_ethereum | 0x3b40...b280 | 169.8447471571 |
WBTC / MKR 0.3% | uniswap_v3 | 0xa237...e4ec | 1403.68104662357 |
AAVE / YFI / UNI / SUSHI / MKR / BAL / COMP / WETH 0.15% | balancer_ethereum | 0x01ab...a163 | 173.234483768539 |
AAVE / UNI / SUSHI / MKR / BAL / COMP / SNX / WETH 0.5% | balancer_ethereum | 0xb6b9...468a | 176.4875256594 |
COMP / MKR | uniswap_v2 | 0x72ef...52e5 | 1384.81213035568 |
UMA / YFI / UNI / LINK / AAVE / MKR / SNX / WETH 0.15% | balancer_ethereum | 0x0980...ca09 | 2.7459610832 |
MKR / DAI | uniswap_v2 | 0x517f...fcc8 | 1388.04948051825 |
SKY / MKR 0.3% | uniswap_v3 | 0x881e...db86 | 1340.8120109461 |
DAI / MKR | antfarm-ethereum | 0x0969...66f9 | 1481.2022464518 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.