| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| yDAI+yUSDC+yUSDT+yTUSD / WETH | uniswap_v2 | 0x55df...0816 | 0.0000280666942950214 |
| KASSIAHOME / yDAI+yUSDC+yUSDT+yTUSD | uniswap_v2 | 0xeac7...af4f | 1.12481656530443370467555792127608630019346656081417062613203995563455680738341487125387056 |
| KASSIAHOTEL / yDAI+yUSDC+yUSDT+yTUSD | uniswap_v2 | 0x8f2d...f943 | 0.01156604218 |
| AMPL / yDAI+yUSDC+yUSDT+yTUSD | uniswap_v2 | 0x730c...cae6 | 0.0181959983983367 |
| PYLON / yDAI+yUSDC+yUSDT+yTUSD | uniswap_v2 | 0xebc1...47be | 0.00002843129712 |
| USDC / yDAI+yUSDC+yUSDT+yTUSD 0.3% | balancer_ethereum | 0x90ed...e5cf | 0.05205532175 |
| GOKU / yDAI+yUSDC+yUSDT+yTUSD | uniswap_v2 | 0xddb8...8ca6 | 0.00002737841391 |
| YAMv2 / yDAI+yUSDC+yUSDT+yTUSD | uniswap_v2 | 0x9387...f561 | 0.00006804696428 |
| yyDAI+yUSDC+yUSDT+yTUSD / yDAI+yUSDC+yUSDT+yTUSD | uniswap_v2 | 0x2471...8b14 | 0.01153896905 |
| yDAI+yUSDC+yUSDT+yTUSD / GRAP | uniswap_v2 | 0x4efd...f549 | 0.01184044398 |
| CROWN / yDAI+yUSDC+yUSDT+yTUSD | uniswap_v2 | 0x2df4...8c3a | 0.00003340846868 |
| YAM / yDAI+yUSDC+yUSDT+yTUSD | uniswap_v2 | 0x2c7a...f726 | 0.00003340846868 |
| TEA / yDAI+yUSDC+yUSDT+yTUSD | uniswap_v2 | 0x2066...82da | 1.14740547685634839134041469387609870902260549980770978862275734713531557506305884646616844 |
| PASTA / yDAI+yUSDC+yUSDT+yTUSD | uniswap_v2 | 0xe524...1c86 | 0.01160078867 |
| YAM2 / yDAI+yUSDC+yUSDT+yTUSD | uniswap_v2 | 0xc329...167b | 1.14136744814451042105914996353969841595653242637106566213212999461977168512560301742533118 |
| BEE / yDAI+yUSDC+yUSDT+yTUSD | uniswap_v2 | 0x04bd...cbe7 | 0.000033408473 |
| EUSD / yDAI+yUSDC+yUSDT+yTUSD | uniswap_v2 | 0x6560...8a4a | 0.01112997006 |
| SOLARITE / yDAI+yUSDC+yUSDT+yTUSD | uniswap_v2 | 0x7bc3...7925 | 0.01188844967 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.