Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
ENS / WETH 0.3% | uniswap_v3 | 0x9256...f58a | 15.7402693768424 |
ENS / USDT 0.3% | uniswap_v3 | 0x09aa...0bfb | 15.8586261547326 |
ENS / ETH 0.3% | uniswap-v4-ethereum | 0x8f3d...6049 | 15.8393324153137 |
ENS / WETH | sushiswap | 0xa118...f75d | 15.8050624813597 |
ENS / WETH 1% | uniswap_v3 | 0xb9c4...37a3 | 16.137055840682 |
ENS / UNI 0.3% | uniswap_v3 | 0x4f50...6388 | 15.9851036161002 |
ENS / WETH | uniswap_v2 | 0xb87b...1049 | 15.8463348103661 |
ENS / DAI 0.3% | uniswap_v3 | 0xd358...096c | 16.0170839320417 |
AAVE / BAL / RARE / ENS / RPL / GTC / HAUS / ROBOT 0.42% | balancer_ethereum | 0x20fa...5233 | 170.023715796518 |
ENS / WETH 0.3% | sushiswap-v3-ethereum | 0xfecf...cb00 | 15.8580505099595 |
ENS / USDC 1% | uniswap_v3 | 0x5f7e...bad4 | 17.7231428409518 |
ENS / USDC 0.3% | uniswap_v3 | 0x6191...f77f | 19.8027092584 |
[invalid] / ENS 1% | uniswap_v3 | 0x9d84...f67d | 15.9850666379 |
RNG / ENS 0.3% | uniswap_v3 | 0x5432...8cf4 | 23.8001661454279 |
ENS / WETH 0.25% | pancakeswap-v3-ethereum | 0x392d...2a2b | 18.3938420537956 |
ENS / USDT 0.3% | sushiswap-v3-ethereum | 0x482b...bad7 | 16.151138019885 |
ENS / WETH 0.1% | balancer_ethereum | 0xefdc...9cf8 | 18.3428174056 |
ENS / WETH 0.05% | uniswap_v3 | 0x4683...44eb | 98.406891271839053312702181981288 |
ENS / USDC | sushiswap | 0xdf2a...0dc3 | 19.8000487421 |
ENS / USDC | uniswap_v2 | 0xb169...a9b4 | 20.4119193936 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.