Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
DPI / WETH | uniswap_v2 | 0x4d5e...9991 | 67.9260297866497 |
DPI / WETH 0.3% | uniswap_v3 | 0x9359...6ca7 | 68.1010234659353 |
DPI / WETH | sushiswap | 0x34b1...c7ed | 67.8680999016309 |
DPI / WBTC / WETH 0.5% | balancer_ethereum | 0x61d5...c7fd | 69.0706186219781 |
DPI / FEI | sushiswap | 0x8775...b528 | 67.9482907020085 |
DPI / CRO | defi_swap | 0x456a...5481 | 68.1171715614754 |
DPI / WETH | defi_swap | 0x7161...a18d | 70.1354329466169 |
DPI / WETH 1% | uniswap_v3 | 0x5441...ebc7 | 102.936611986349 |
DPI / PKG | uniswap_v2 | 0x2f82...a2a1 | 81.3750349614 |
DPI / USDC | uniswap_v2 | 0xf298...36aa | 63.6774944827 |
DPI / AMIS | uniswap_v2 | 0x4c57...0570 | 88.6192839786 |
DPI / [invalid] | uniswap_v2 | 0x617b...ee83 | 107.0470205683 |
DPI / WSTA | sushiswap | 0xccc6...deb5 | 68.445915502484 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.