| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| AURA / WETH 0.5% | balancer_ethereum | 0xcfca...08b9 | 0.076814196560418 |
| AURA / WETH 1% | balancer_ethereum | 0xc295...0d9d | 0.0771910789516251 |
| AURA / WETH | sushiswap | 0xc423...c90a | 0.0776624803661498 |
| AURA / WETH | uniswap_v2 | 0x3cfe...f46c | 0.079050625201499 |
| kaiAURA / AURA 0.1% | balancer_ethereum | 0x62e5...305b | 0.0645541857799374 |
| AURA / WETH 0.3% | uniswap_v3 | 0x4be4...242b | 0.07026564408 |
| AURA / USDT 0.3% | uniswap-v4-ethereum | 0x2fea...6e8e | 0.1426679486 |
| graviAURA / WETH / AURA 0.3% | balancer_ethereum | 0xa328...fff2 | 0.06349184101 |
| graviAURA / AURA 1% | balancer_ethereum | 0x9f40...af4a | 0.0821771000356685 |
| AURA / USDT 1% | uniswap_v3 | 0xb404...0aaf | 0.4654952871 |
| AURA / USDC 0.3% | balancer_ethereum | 0x5210...4339 | 0.9208079766 |
| AURA / WETH 10% | balancer_ethereum | 0x8b66...c449 | 0.3885121891 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.