| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| COMP / WETH 0.3% | uniswap_v3 | 0xea4b...2ab6 | 24.5667542789436 |
| COMP / WETH | uniswap_v2 | 0xcffd...516f | 24.2815480529386 |
| COMP / WETH | sushiswap | 0x3150...2355 | 24.2987279655548 |
| PENDLE / COMP 0.3% | uniswap_v3 | 0x7b15...6f5a | 24.1793463643921 |
| COMP / WETH 0.75% | balancer_ethereum | 0xefaa...e377 | 25.5831646832731 |
| wstETH / COMP 0.5% | balancer_ethereum | 0x87a8...8f22 | 25.547477587945 |
| COMP / WETH | defi_swap | 0x59f7...5b78 | 25.5600776261832 |
| COMP / WETH | shibaswap | 0xd94e...cb4a | 25.1529895946217 |
| COMP / WETH | sakeswap | 0xc134...5c50 | 25.3405643648065 |
| COMP / DAI | uniswap_v2 | 0xf319...efab | 24.1132357980912 |
| COMP / UNI | uniswap_v2 | 0x83c7...1b5e | 25.6332837926156 |
| LINK / COMP | defi_swap | 0x260f...7637 | 25.6349007159795 |
| AAVE / YFI / UNI / SUSHI / MKR / BAL / COMP / WETH 0.15% | balancer_ethereum | 0x01ab...a163 | 167.3718270985 |
| COMP / USDC | uniswap_v2 | 0x6f81...3420 | 24.9672883238926 |
| COMP / WETH 1% | uniswap_v3 | 0x5598...c2f6 | 26.5986162964923 |
| ETH / COMP 0.3% | uniswap-v4-ethereum | 0x10b4...3e1d | 25.7314798838717 |
| AAVE / COMP 1% | uniswap-v4-ethereum | 0xea1d...329e | 25.633657908 |
| CRO / COMP | defi_swap | 0x2e5b...3a64 | 25.8259308680281 |
| AAVE / UNI / SUSHI / MKR / COMP / SNX / GRT / CRV 0.5% | balancer_ethereum | 0x3b40...b280 | 160.897173032 |
| wstETH / COMP 0.25% | balancer_ethereum | 0x496f...90f7 | 25.8705849246349 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.