| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| BAL / WETH 1% | balancer_ethereum | 0x5c6e...8f56 | 0.68602249532756 |
| BAL / WETH | uniswap_v2 | 0xa70d...d593 | 0.673545352504163 |
| AAVE / BAL / RARE / ENS / RPL / GTC / HAUS / ROBOT 0.42% | balancer_ethereum | 0x20fa...5233 | 0.708901011183604 |
| BAL / WETH 0.1% | balancer_ethereum | 0x3ebf...480f | 0.683849611054736 |
| BAL / USDC 0.07% | balancer_ethereum | 0x9c08...7ed5 | 0.692844595366323 |
| BAL / UNI | uniswap_v2 | 0x896d...fd1c | 0.701980439851696 |
| BAL / WETH | sushiswap | 0x9bff...3022 | 0.67481187406219 |
| BAL / DAI 1% | balancer_ethereum | 0x4626...1677 | 0.690191777860596 |
| GNO / DAI / BAL / WETH 1% | balancer_ethereum | 0x148c...1c59 | 125.664906664222 |
| MATIC / YFI / AAVE / MKR / BAL / COMP / SNX / WETH 1% | balancer_ethereum | 0x9e7f...892d | 0.2542807402 |
| D2D / BAL 2.5% | balancer_ethereum | 0x8f42...5639 | 0.696988988793626 |
| AAVE / YFI / UNI / SUSHI / MKR / BAL / COMP / WETH 0.15% | balancer_ethereum | 0x01ab...a163 | 177.3766221981 |
| AAVE / UNI / SUSHI / MKR / BAL / COMP / SNX / WETH 0.5% | balancer_ethereum | 0xb6b9...468a | 214.5819498583 |
| BAL / MANA | uniswap_v2 | 0xb91a...9c38 | 0.697020463346263 |
| AAVE / BAL 0.3% | balancer_ethereum | 0x8517...d39e | 0.714116410807625 |
| auraBAL / BAL | solidlydex | 0x79ce...b3df | 0.68983930551464 |
| BAL / DAI / USDC / AXS / WETH / SLP / USDT 0.47% | balancer_ethereum | 0xc314...c6d2 | 9.170286234915131865601413151018415741597 |
| BAL / WETH 0.3% | uniswap_v3 | 0xdc2c...5cc9 | 0.713006635765345 |
| BAL / WBTC / WETH / NODED 1% | balancer_ethereum | 0x6b9e...ec03 | 1.0985029521 |
| BAL / WBTC 0.06% | balancer_ethereum | 0x9f1f...f7ef | 0.713563697020299 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.