| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| BAL / WETH 1% | balancer_ethereum | 0x5c6e...8f56 | 0.513577318375966 |
| AAVE / BAL / RARE / ENS / RPL / GTC / HAUS / ROBOT 0.42% | balancer_ethereum | 0x20fa...5233 | 0.546872667380861 |
| BAL / WETH | uniswap_v2 | 0xa70d...d593 | 0.51407747903489 |
| BAL / WETH 0.1% | balancer_ethereum | 0x3ebf...480f | 0.518690865290361 |
| BAL / USDC 0.07% | balancer_ethereum | 0x9c08...7ed5 | 0.53676839407246 |
| BAL / DAI 1% | balancer_ethereum | 0x4626...1677 | 0.521310069103372 |
| GNO / DAI / BAL / WETH 1% | balancer_ethereum | 0x148c...1c59 | 140.57995543 |
| AAVE / YFI / UNI / SUSHI / MKR / BAL / COMP / WETH 0.15% | balancer_ethereum | 0x01ab...a163 | 167.3718270985 |
| BAL / MANA | uniswap_v2 | 0xb91a...9c38 | 0.539566672291886 |
| YFV / BAL | uniswap_v2 | 0x1d27...8ba6 | 0.561017074333396 |
| BAL / WETH 0.3% | uniswap_v3 | 0xdc2c...5cc9 | 0.575867607543202 |
| BAL / WETH | sushiswap | 0x9bff...3022 | 0.533788319801823 |
| BAL / UNI | uniswap_v2 | 0x896d...fd1c | 0.534458788393277 |
| BAL / WBTC / WETH / NODED 1% | balancer_ethereum | 0x6b9e...ec03 | 1.0985029521 |
| MATIC / YFI / AAVE / MKR / BAL / COMP / SNX / WETH 1% | balancer_ethereum | 0x9e7f...892d | 0.1619549959 |
| BAL / WBTC 0.06% | balancer_ethereum | 0x9f1f...f7ef | 0.560335887499557 |
| D2D / BAL 2.5% | balancer_ethereum | 0x8f42...5639 | 0.545596444066591 |
| AAVE / UNI / SUSHI / MKR / BAL / COMP / SNX / WETH 0.5% | balancer_ethereum | 0xb6b9...468a | 158.4499493664 |
| BAL / WETH | defi_swap | 0x4468...d563 | 0.564736231967277 |
| SOUL / BAL | uniswap_v2 | 0xca99...fd76 | 0.5593299106 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.