Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
sUSD / SNX 1% | uniswap_v3 | 0xa3cc...eb1e | 0.789911262343051 |
SNX / WETH 0.3% | uniswap_v3 | 0xede8...b8cf | 0.788050278147392 |
SNX / WETH | uniswap_v2 | 0x43ae...3d47 | 0.789520734407986 |
SNX / WETH | sushiswap | 0xa1d7...c470 | 0.775411313984181 |
SNX / WETH 1% | balancer_ethereum | 0x072f...ac9b | 0.751855932446255 |
USDC / SNX 1% | uniswap_v3 | 0x020c...e892 | 0.751472512141206 |
SNX / WETH | shibaswap | 0xf303...3fb6 | 0.758806129324098 |
SNX / sil | sushiswap | 0x2c01...1c36 | 0.743831110814745 |
AAVE / UNI / SUSHI / MKR / COMP / SNX / GRT / CRV 0.5% | balancer_ethereum | 0x3b40...b280 | 172.29721506093 |
SNX / WETH 0.3% | sushiswap-v3-ethereum | 0x23f1...73a7 | 0.770914481149274 |
WBTC / SNX 1% | uniswap_v3 | 0x15c1...39b1 | 1.868699562 |
SNX / N3RDz | uniswap_v2 | 0x7ad0...58d5 | 0.638969498867493 |
DAI / SNX 1% | uniswap_v3 | 0x0c18...2213 | 2.1147196856 |
MATIC / YFI / AAVE / MKR / BAL / COMP / SNX / WETH 1% | balancer_ethereum | 0x9e7f...892d | 0.2215096312 |
SNX / WETH 1% | uniswap_v3 | 0xf5ce...118f | 0.9510737272 |
SNX / LINK | uniswap_v2 | 0x5a3c...2586 | 0.652960749918542 |
BAT / WBTC / REN / MATIC / SNX / WETH 0.3% | balancer_ethereum | 0x35c2...55aa | 0.1475811149 |
Seal / SNX | uniswap_v2 | 0x2abf...e87e | 0.6604364733 |
UMA / YFI / UNI / LINK / AAVE / MKR / SNX / WETH 0.15% | balancer_ethereum | 0x0980...ca09 | 1.1372539378 |
AAVE / UNI / SUSHI / MKR / BAL / COMP / SNX / WETH 0.5% | balancer_ethereum | 0xb6b9...468a | 171.166674964504 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.