Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
ENS / WETH 0.3% | uniswap_v3 | 0x9256...f58a | 15.2275241372282 |
ENS / USDC 1% | uniswap_v3 | 0x5f7e...bad4 | 15.0362668080153 |
ENS / USDT 0.3% | uniswap_v3 | 0x09aa...0bfb | 15.1486307522523 |
ENS / WETH | sushiswap | 0xa118...f75d | 15.1904162755038 |
ENS / WETH 1% | uniswap_v3 | 0xb9c4...37a3 | 15.9667871001404 |
ENS / ETH 0.3% | uniswap-v4-ethereum | 0x8f3d...6049 | 15.4052403507805 |
rust / ENS 1% | uniswap-v4-ethereum | 0x6331...d6ce | 15.1302578156594 |
ENS / WETH | uniswap_v2 | 0xb87b...1049 | 15.1650192481895 |
AAVE / BAL / RARE / ENS / RPL / GTC / HAUS / ROBOT 0.42% | balancer_ethereum | 0x20fa...5233 | 220.561769488647 |
ENS / DAI 0.3% | uniswap_v3 | 0xd358...096c | 15.2454044098456 |
ENS / USDT 0.3% | sushiswap-v3-ethereum | 0x482b...bad7 | 15.3568139905509 |
ENS / USDC 0.3% | uniswap_v3 | 0x6191...f77f | 20.8326343074 |
USDC / ENS 1% | uniswap-v4-ethereum | 0x965d...4d44 | 23.6886228443 |
[invalid] / ENS 1% | uniswap_v3 | 0x9d84...f67d | 15.1405442743 |
ENS / ETH | uniswap-v4-ethereum | 0x40ef...09f6 | 15.4058166838722 |
USDC / ENS 0.3% | uniswap-v4-ethereum | 0xec3b...d058 | 20.0140834895 |
ENS / ETH 1% | uniswap-v4-ethereum | 0xad28...0f61 | 15.3462816261096 |
ENS / KABOSU | uniswap_v2 | 0xa340...2490 | 15.1710516584671 |
RNG / ENS 0.3% | uniswap_v3 | 0x5432...8cf4 | 23.8001661454279 |
ENS / WETH 0.3% | sushiswap-v3-ethereum | 0xfecf...cb00 | 28.704455295 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.