| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ENS / WETH 0.3% | uniswap_v3 | 0x9256...f58a | 6.75415683000131 |
| ENS / USDC 1% | uniswap_v3 | 0x5f7e...bad4 | 6.75138125961655 |
| ENS / WETH 1% | uniswap_v3 | 0xb9c4...37a3 | 6.49897519809984 |
| ENS / WETH | sushiswap | 0xa118...f75d | 6.8009261645737 |
| ENS / ETH 0.3% | uniswap-v4-ethereum | 0x8f3d...6049 | 6.85601514068441 |
| ENS / USDT 0.3% | uniswap_v3 | 0x09aa...0bfb | 6.81995964280029 |
| rust / ENS 1% | uniswap-v4-ethereum | 0x6331...d6ce | 6.84575415773653 |
| ENS / WETH | uniswap_v2 | 0xb87b...1049 | 6.81328988447048 |
| AAVE / BAL / RARE / ENS / RPL / GTC / HAUS / ROBOT 0.42% | balancer_ethereum | 0x20fa...5233 | 127.164856017324 |
| ENS / ETH | uniswap-v4-ethereum | 0x40ef...09f6 | 6.69261158151547 |
| ENS / USDC 0.3% | uniswap_v3 | 0x6191...f77f | 20.5045917131 |
| USDC / ENS 1% | uniswap-v4-ethereum | 0x965d...4d44 | 23.6886228443 |
| [invalid] / ENS 1% | uniswap_v3 | 0x9d84...f67d | 9.5598404357 |
| ENS / ETH 1% | uniswap-v4-ethereum | 0xad28...0f61 | 6.96647515341706 |
| ENS / DAI 0.3% | uniswap_v3 | 0xd358...096c | 7.59430934549472 |
| USDC / ENS 0.3% | uniswap-v4-ethereum | 0xec3b...d058 | 19.9501105719 |
| ENS / LINK 1% | uniswap_v3 | 0xb5f7...bf92 | 6.93556825291792 |
| RNG / ENS 0.3% | uniswap_v3 | 0x5432...8cf4 | 23.8001661454279 |
| ENS / WETH 0.3% | sushiswap-v3-ethereum | 0xfecf...cb00 | 28.704455295 |
| RODO / ENS 0.01% | uniswap_v3 | 0x7052...9857 | 27.2980272860469 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.