Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
DPI / WETH | uniswap_v2 | 0x4d5e...9991 | 83.7183666581492 |
DPI / WETH 0.3% | uniswap_v3 | 0x9359...6ca7 | 83.8962375971552 |
DPI / WETH | sushiswap | 0x34b1...c7ed | 83.9451408076884 |
DPI / WBTC / WETH 0.5% | balancer_ethereum | 0x61d5...c7fd | 84.6435940146615 |
DPI / WETH 1% | uniswap_v3 | 0x5441...ebc7 | 102.936611986349 |
DPI / FEI | sushiswap | 0x8775...b528 | 87.2203436067 |
DPI / WETH | defi_swap | 0x7161...a18d | 81.6930074679 |
DPI / CRO | defi_swap | 0x456a...5481 | 89.9770304105 |
DPI / PKG | uniswap_v2 | 0x2f82...a2a1 | 81.3750349614 |
DPI / USDC | uniswap_v2 | 0xf298...36aa | 80.3299113296 |
DPI / AMIS | uniswap_v2 | 0x4c57...0570 | 89.0404728967 |
DPI / [invalid] | uniswap_v2 | 0x617b...ee83 | 107.0470205683 |
DPI / WSTA | sushiswap | 0xccc6...deb5 | 68.445915502484 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.