| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ENS / WETH 0.3% | uniswap_v3 | 0x9256...f58a | 6.226389448 |
| ENS / WETH | sushiswap | 0xa118...f75d | 6.1938498102 |
| ENS / USDC 1% | uniswap_v3 | 0x5f7e...bad4 | 6.3000145681 |
| ENS / WETH 1% | uniswap_v3 | 0xb9c4...37a3 | 6.1919181498 |
| ENS / ETH 0.3% | uniswap-v4-ethereum | 0x8f3d...6049 | 6.2081403126 |
| ENS / USDT 0.3% | uniswap_v3 | 0x09aa...0bfb | 6.2410603511 |
| ENS / WETH | uniswap_v2 | 0xb87b...1049 | 6.2131112741 |
| AAVE / BAL / RARE / ENS / RPL / GTC / HAUS / ROBOT 0.42% | balancer_ethereum | 0x20fa...5233 | 116.8325812712 |
| ENS / ETH | uniswap-v4-ethereum | 0x40ef...09f6 | 6.3074814229 |
| ENS / LINK 1% | uniswap_v3 | 0xb5f7...bf92 | 6.2645193557 |
| rust / ENS 1% | uniswap-v4-ethereum | 0x6331...d6ce | 6.47624853548218 |
| ENS / USDT 50% | uniswap-v4-ethereum | 0xbd5c...cf39 | 5.1607713042 |
| ENS / USDC 0.3% | uniswap_v3 | 0x6191...f77f | 20.5045917131 |
| USDC / ENS 1% | uniswap-v4-ethereum | 0x965d...4d44 | 23.6886228443 |
| ENS / ETH 1% | uniswap-v4-ethereum | 0xad28...0f61 | 6.4307130347 |
| [invalid] / ENS 1% | uniswap_v3 | 0x9d84...f67d | 5.94458500550014 |
| ENS / LINK / WETH 0.3% | balancer-v3-ethereum | 0xfd0c...f9b8 | 6.7221935762 |
| ENS / DAI 0.3% | uniswap_v3 | 0xd358...096c | 7.4691823262 |
| USDC / ENS 0.3% | uniswap-v4-ethereum | 0xec3b...d058 | 19.9575732057 |
| RNG / ENS 0.3% | uniswap_v3 | 0x5432...8cf4 | 23.8001661454279 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.