Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
ETHFI / WETH 0.3% | uniswap_v3 | 0x06f0...8189 | 0.595407110928682 |
ETHFI / USDT 0.3% | uniswap_v3 | 0x80fa...6644 | 0.595278134625183 |
ETHFI / weETH | curve | 0xcccd...2a7e | 0.583870109587175 |
ETHFI / WETH 1% | uniswap_v3 | 0xdefd...3e1c | 0.598350778945513 |
ETHFI / WETH | uniswap_v2 | 0xbcf7...bef6 | 0.581043840920449 |
kpEF-5 / ETHFI 1% | uniswap_v3 | 0x7a3d...1f3f | 0.605990605279471 |
ETHFI / USDC 1% | uniswap_v3 | 0x4d39...1e66 | 0.574511300138682 |
EIGEN / ETHFI 1% | uniswap-v4-ethereum | 0x924c...7b88 | 1.1153383312 |
kpEF-4 / ETHFI 1% | uniswap_v3 | 0x880f...93ca | 1.0912521838 |
KABOSU / ETHFI | uniswap_v2 | 0xcd79...ea2a | 0.6731832304 |
ETHFI / ETH 0.01% | uniswap-v4-ethereum | 0x16ef...23a0 | 0.612155047355881 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.