| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ENS / WETH 0.3% | uniswap_v3 | 0x9256...f58a | 6.4145461929 |
| ENS / WETH | sushiswap | 0xa118...f75d | 6.4271224852 |
| ENS / WETH 1% | uniswap_v3 | 0xb9c4...37a3 | 6.5344564612 |
| ENS / ETH 0.3% | uniswap-v4-ethereum | 0x8f3d...6049 | 6.4259369908 |
| ENS / USDC 1% | uniswap_v3 | 0x5f7e...bad4 | 6.5215300995 |
| rust / ENS 1% | uniswap-v4-ethereum | 0x6331...d6ce | 6.54278412075164 |
| ENS / USDT 0.3% | uniswap_v3 | 0x09aa...0bfb | 6.5128792198 |
| ENS / WETH | uniswap_v2 | 0xb87b...1049 | 6.4274838286 |
| AAVE / BAL / RARE / ENS / RPL / GTC / HAUS / ROBOT 0.42% | balancer_ethereum | 0x20fa...5233 | 91.075815212 |
| ENS / ETH 1% | uniswap-v4-ethereum | 0xad28...0f61 | 6.3676450953 |
| [invalid] / ENS 1% | uniswap_v3 | 0x9d84...f67d | 6.35266046206646 |
| ENS / USDC | sushiswap | 0xdf2a...0dc3 | 6.5150066515 |
| ENS / USDT 50% | uniswap-v4-ethereum | 0xbd5c...cf39 | 5.1607713042 |
| ENS / USDC 0.3% | uniswap_v3 | 0x6191...f77f | 20.5045917131 |
| USDC / ENS 1% | uniswap-v4-ethereum | 0x965d...4d44 | 23.6886228443 |
| ENS / ETH | uniswap-v4-ethereum | 0x40ef...09f6 | 6.5642613185 |
| ENS / DAI 0.3% | uniswap_v3 | 0xd358...096c | 7.5721869642 |
| ENS / LINK / WETH 0.3% | balancer-v3-ethereum | 0xfd0c...f9b8 | 5.9276814261 |
| USDC / ENS 0.3% | uniswap-v4-ethereum | 0xec3b...d058 | 19.9575732057 |
| ENS / LINK 1% | uniswap_v3 | 0xb5f7...bf92 | 5.8944779003 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.