Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
DAO / WETH | uniswap_v2 | 0x7dd3...2272 | 0.127710952778572 |
DAO / USDC | uniswap_v2 | 0x4cd3...20bf | 0.128311215048143 |
DAO / USDC 0.3% | uniswap_v3 | 0xc840...424a | 0.133479990661343 |
DAO / WETH | sushiswap | 0x96f5...a72a | 0.136996529353378 |
DAO / USDT | orion-ethereum | 0x6455...e322 | 0.131377043954262 |
DAO / WETH 0.3% | uniswap_v3 | 0x087a...717a | 1.12228539121334 |
DAO / USDC 1% | uniswap_v3 | 0x15e7...a129 | 0.53633394939273 |
DAO / USDT | uniswap_v2 | 0x9646...2ddc | 0.2095322048 |
DAO / USDC 0.01% | uniswap_v3 | 0x4be6...33a6 | 0.991685158229884 |
DAO / USDT 1% | uniswap_v3 | 0x732c...821a | 1.29322826447326238237451869887 |
DAO / WETH 1% | uniswap_v3 | 0x11a7...fcc2 | 4.353833705940664483539333545031 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.