| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| COMP / WETH 0.3% | uniswap_v3 | 0xea4b...2ab6 | 31.5568237160017 |
| COMP / WETH | uniswap_v2 | 0xcffd...516f | 31.5081482207026 |
| COMP / WETH 1% | uniswap_v3 | 0x5598...c2f6 | 31.7747827019586 |
| COMP / WETH | sushiswap | 0x3150...2355 | 31.515855455417 |
| PENDLE / COMP 0.3% | uniswap_v3 | 0x7b15...6f5a | 31.8857263841503 |
| COMP / WETH 0.75% | balancer_ethereum | 0xefaa...e377 | 31.6933311061843 |
| KABOSU / COMP | uniswap_v2 | 0x55c9...395f | 31.7106841951943 |
| COMP / UNI | uniswap_v2 | 0x83c7...1b5e | 31.5886306289964 |
| COMP / DAI | uniswap_v2 | 0xf319...efab | 31.6708188208066 |
| AAVE / UNI / SUSHI / MKR / COMP / SNX / GRT / CRV 0.5% | balancer_ethereum | 0x3b40...b280 | 204.781387930309 |
| CRO / COMP | defi_swap | 0x2e5b...3a64 | 30.7980571937616 |
| COMP / WETH | defi_swap | 0x59f7...5b78 | 31.5218360988895 |
| ETHMNY / COMP | sushiswap | 0xfd36...5b39 | 31.7106841951943 |
| ENA / COMP 1% | uniswap-v4-ethereum | 0xe48f...87ed | 31.4823962643979 |
| COMP / WETH | shibaswap | 0xd94e...cb4a | 31.3673783338953 |
| DREAM / COMP | uniswap_v2 | 0x3bac...3bc7 | 31.139612355334 |
| SHIB / COMP | shibaswap | 0x58e9...68a8 | 30.8010612710237 |
| AAVE / YFI / UNI / SUSHI / MKR / BAL / COMP / WETH 0.15% | balancer_ethereum | 0x01ab...a163 | 177.3766221981 |
| CHZ / YFI / UNI / WBTC / LINK / COMP / WETH 0.3% | balancer_ethereum | 0xa33e...b2e9 | 0.13173057786124417806767507008 |
| LINK / COMP 0.3% | balancer_ethereum | 0x6e13...d533 | 31.5246614988244 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.