| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| MKR / WETH | uniswap_v2 | 0xc2ad...a225 | 1562.87780722012 |
| SKY / MKR 0.3% | uniswap_v3 | 0x881e...db86 | 1563.06986484822 |
| MKR / WETH 0.3% | uniswap_v3 | 0xe8c6...e531 | 1562.00464778263 |
| MKR / WETH | sushiswap | 0xba13...50dd | 1586.79724219741 |
| MKR / WETH 0.26% | balancer_ethereum | 0xaac9...86ce | 1563.84381493362 |
| USDT / MKR 1% | uniswap-v4-ethereum | 0x0611...7b68 | 1585.73300948599 |
| ETH / MKR 0.3% | uniswap-v4-ethereum | 0xcde9...d0a8 | 1593.93000763606 |
| DAI / MKR 0.3% | uniswap_v3 | 0x2a84...cba4 | 1572.9961096922 |
| LK99 / MKR 0.3% | uniswap_v3 | 0x6536...73c1 | 1582.5553504488 |
| MKR / HAKKA | uniswap_v2 | 0xb8b8...a6a9 | 1587.09190816473 |
| sil / MKR | sushiswap | 0xf15e...9dbc | 1591.64588280856 |
| MKR / WETH 1% | uniswap_v3 | 0x3afd...0316 | 1588.29315044535 |
| MKR / USDT | uniswap_v2 | 0xa14d...c043 | 1587.89428009536 |
| WBTC / MKR 0.3% | uniswap_v3 | 0xa237...e4ec | 1588.15387870118 |
| MKR / WETH | defi_swap | 0x46d9...db47 | 1572.20587811437 |
| SKY / MKR 0.3% | uniswap-v4-ethereum | 0x7077...07b4 | 1555.26811954973 |
| DAI / MKR | antfarm-ethereum | 0x0969...66f9 | 1827.4452786662 |
| ETH / MKR 1% | uniswap-v4-ethereum | 0x9707...2b94 | 2360.3617946991 |
| AAVE / UNI / SUSHI / MKR / COMP / SNX / GRT / CRV 0.5% | balancer_ethereum | 0x3b40...b280 | 163.327995310246 |
| AAVE / LINK / MKR / AMPL 10% | balancer_ethereum | 0x6b0d...43e2 | 140.9705682637 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.