Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
COMP / WETH 0.3% | uniswap_v3 | 0xea4b...2ab6 | 41.5256913553772 |
COMP / WETH | uniswap_v2 | 0xcffd...516f | 41.9726852030064 |
COMP / WETH | sushiswap | 0x3150...2355 | 41.5511752339539 |
ETH / COMP 0.3% | uniswap-v4-ethereum | 0x10b4...3e1d | 41.53050849531 |
AAVE / UNI / SUSHI / MKR / COMP / SNX / GRT / CRV 0.5% | balancer_ethereum | 0x3b40...b280 | 290.256384909666 |
LINK / COMP | defi_swap | 0x260f...7637 | 41.1062767828598 |
COMP / WETH | defi_swap | 0x59f7...5b78 | 40.4452749750386 |
COMP / WETH | shibaswap | 0xd94e...cb4a | 40.6428514784767 |
wstETH / COMP 0.25% | balancer_ethereum | 0x496f...90f7 | 40.5325956884925 |
AAVE / YFI / UNI / SUSHI / MKR / BAL / COMP / WETH 0.15% | balancer_ethereum | 0x01ab...a163 | 144.8255149743 |
SHIB / COMP | shibaswap | 0x58e9...68a8 | 41.1799043029925 |
BAT / COMP | uniswap_v2 | 0x112b...ed1b | 40.5327571523524 |
COMP / WETH 1% | uniswap_v3 | 0x5598...c2f6 | 40.7010024944101 |
wstETH / COMP 0.5% | balancer_ethereum | 0x87a8...8f22 | 40.3239843814498 |
COMP / WETH 0.75% | balancer_ethereum | 0xefaa...e377 | 41.4538655550629 |
AAVE / COMP 1% | uniswap-v4-ethereum | 0xea1d...329e | 40.7528323934508 |
CRO / COMP | defi_swap | 0x2e5b...3a64 | 41.3962142200071 |
COMP / WETH | sakeswap | 0xc134...5c50 | 41.5387778739104 |
COMP / UNI | uniswap_v2 | 0x83c7...1b5e | 40.6509486978286 |
COMP / DAI | uniswap_v2 | 0xf319...efab | 40.6780746262985 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.