Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
COMP / WETH 0.3% | uniswap_v3 | 0xea4b...2ab6 | 42.3193551375042 |
COMP / WETH 1% | uniswap_v3 | 0x5598...c2f6 | 41.7625688750775 |
COMP / WETH | uniswap_v2 | 0xcffd...516f | 42.25759485915 |
COMP / WETH | sushiswap | 0x3150...2355 | 42.2770349408453 |
wstETH / COMP 0.5% | balancer_ethereum | 0x87a8...8f22 | 42.0115686415527 |
COMP / WETH 0.75% | balancer_ethereum | 0xefaa...e377 | 41.5955917587132 |
AAVE / UNI / SUSHI / MKR / COMP / SNX / GRT / CRV 0.5% | balancer_ethereum | 0x3b40...b280 | 169.844747157082 |
COMP / WETH | defi_swap | 0x59f7...5b78 | 40.8044294690992 |
COMP / WETH | shibaswap | 0xd94e...cb4a | 40.5417399280073 |
ICHI / COMP 0.3% | uniswap_v3 | 0x3fd4...a297 | 39.1592805301794 |
AAVE / YFI / UNI / SUSHI / MKR / BAL / COMP / WETH 0.15% | balancer_ethereum | 0x01ab...a163 | 114.710829198753 |
MATIC / YFI / AAVE / MKR / BAL / COMP / SNX / WETH 1% | balancer_ethereum | 0x9e7f...892d | 0.3177003879 |
LINK / COMP | defi_swap | 0x260f...7637 | 51.0822124182243 |
CRO / COMP | defi_swap | 0x2e5b...3a64 | 40.0053288096324 |
COMP / WETH | sakeswap | 0xc134...5c50 | 47.8717615449155 |
COMP / UNI | uniswap_v2 | 0x83c7...1b5e | 50.5959731330543 |
COMP / DAI | uniswap_v2 | 0xf319...efab | 39.8080275047188 |
cCOMP / COMP | uniswap_v2 | 0x4ecc...6e6a | 49.756403179 |
AAVE / COMP 1% | uniswap_v3 | 0xceee...2596 | 79.3855228099 |
wstETH / COMP 0.25% | balancer_ethereum | 0x496f...90f7 | 40.2229104578001 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.