| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| MKR / WETH | uniswap_v2 | 0xc2ad...a225 | 1340.27658895026 |
| SKY / MKR 0.3% | uniswap_v3 | 0x881e...db86 | 1343.67048073615 |
| MKR / WETH | sushiswap | 0xba13...50dd | 1342.06495679783 |
| MKR / WETH 0.3% | uniswap_v3 | 0xe8c6...e531 | 1343.09917809356 |
| MKR / WETH 0.26% | balancer_ethereum | 0xaac9...86ce | 1347.71994650143 |
| SKY / MKR 0.3% | uniswap-v4-ethereum | 0x7077...07b4 | 1350.51912086393 |
| MKR / WETH 1% | uniswap_v3 | 0x3afd...0316 | 1344.77110089204 |
| ETH / MKR 0.3% | uniswap-v4-ethereum | 0xcde9...d0a8 | 1351.57624092293 |
| LK99 / MKR 0.3% | uniswap_v3 | 0x6536...73c1 | 1321.32099493996 |
| sil / MKR | sushiswap | 0xf15e...9dbc | 1337.08318532325 |
| MKR / HAKKA | uniswap_v2 | 0xb8b8...a6a9 | 1293.83089871182 |
| DAI / MKR 0.3% | uniswap_v3 | 0x2a84...cba4 | 1336.87888642588 |
| MKR / USDT | uniswap_v2 | 0xa14d...c043 | 1281.09389802436 |
| MKR / USDC | uniswap_v2 | 0x340a...759a | 1263.02619348466 |
| DAI / MKR | antfarm-ethereum | 0x0969...66f9 | 1827.4452786662 |
| DAI / MKR 0.01% | uniswap-v4-ethereum | 0x508b...55d2 | 1411.4445681398 |
| ETH / MKR 1% | uniswap-v4-ethereum | 0x9707...2b94 | 2360.3617946991 |
| AAVE / UNI / SUSHI / MKR / COMP / SNX / GRT / CRV 0.5% | balancer_ethereum | 0x3b40...b280 | 194.173837782551 |
| AAVE / LINK / MKR / AMPL 10% | balancer_ethereum | 0x6b0d...43e2 | 204.867653808 |
| WBTC / MKR 0.3% | uniswap_v3 | 0xa237...e4ec | 1241.6957752216 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.