| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| DPI / WETH | uniswap_v2 | 0x4d5e...9991 | 58.7266640315905 |
| DPI / WETH 0.3% | uniswap_v3 | 0x9359...6ca7 | 58.8247255566684 |
| DPI / WETH | sushiswap | 0x34b1...c7ed | 58.8283394745474 |
| DPI / WBTC / WETH 0.5% | balancer_ethereum | 0x61d5...c7fd | 58.3925764167039 |
| DPI / WETH | defi_swap | 0x7161...a18d | 56.0106807588227 |
| DPI / FEI | sushiswap | 0x8775...b528 | 58.3252248293 |
| DPI / CRO | defi_swap | 0x456a...5481 | 63.2768941571 |
| DPI / PKG | uniswap_v2 | 0x2f82...a2a1 | 59.3913159268 |
| DPI / AMIS | uniswap_v2 | 0x4c57...0570 | 60.322757918 |
| DPI / [invalid] | uniswap_v2 | 0x617b...ee83 | 91.6472200926 |
| DPI / USDC | uniswap_v2 | 0xf298...36aa | 64.598561868 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.