| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ENS / WETH 0.3% | uniswap_v3 | 0x9256...f58a | 9.63691685990703 |
| ENS / USDT 0.3% | uniswap_v3 | 0x09aa...0bfb | 9.74728102312701 |
| ENS / WETH | sushiswap | 0xa118...f75d | 9.63994711474438 |
| ENS / WETH 1% | uniswap_v3 | 0xb9c4...37a3 | 9.58065706392602 |
| ENS / USDC 1% | uniswap_v3 | 0x5f7e...bad4 | 9.58604106380852 |
| ENS / ETH 0.3% | uniswap-v4-ethereum | 0x8f3d...6049 | 9.67011184513763 |
| ENS / WETH | uniswap_v2 | 0xb87b...1049 | 9.60413434135575 |
| AAVE / BAL / RARE / ENS / RPL / GTC / HAUS / ROBOT 0.42% | balancer_ethereum | 0x20fa...5233 | 178.15284648909 |
| ENS / DAI 0.3% | uniswap_v3 | 0xd358...096c | 9.69685655028543 |
| ENS / ETH | uniswap-v4-ethereum | 0x40ef...09f6 | 9.74532105650554 |
| ENS / ETH 1% | uniswap-v4-ethereum | 0xad28...0f61 | 9.76033818621421 |
| ENS / KABOSU | uniswap_v2 | 0xa340...2490 | 9.81693707645104 |
| rust / ENS 1% | uniswap-v4-ethereum | 0x6331...d6ce | 9.86107932772083 |
| ENS / USDC | uniswap_v2 | 0xb169...a9b4 | 9.13559754550871 |
| ENS / LINK 1% | uniswap_v3 | 0xb5f7...bf92 | 9.73500347961172 |
| ENS / USDC 0.3% | uniswap_v3 | 0x6191...f77f | 38.1793165119 |
| USDC / ENS 1% | uniswap-v4-ethereum | 0x965d...4d44 | 23.6886228443 |
| [invalid] / ENS 1% | uniswap_v3 | 0x9d84...f67d | 8.84490654242134 |
| USDC / ENS 0.3% | uniswap-v4-ethereum | 0xec3b...d058 | 19.9501105718685 |
| ENS / WETH 0.3% | sushiswap-v3-ethereum | 0xfecf...cb00 | 28.704455295 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.