| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| DPI / WETH | uniswap_v2 | 0x4d5e...9991 | 65.9014692221296 |
| DPI / WETH 0.3% | uniswap_v3 | 0x9359...6ca7 | 65.7293528624585 |
| DPI / WETH | sushiswap | 0x34b1...c7ed | 65.8290379306618 |
| DPI / WBTC / WETH 0.5% | balancer_ethereum | 0x61d5...c7fd | 65.5181471924175 |
| DPI / FEI | sushiswap | 0x8775...b528 | 179.470887756474 |
| DPI / WETH | defi_swap | 0x7161...a18d | 66.5116127604105 |
| DPI / PKG | uniswap_v2 | 0x2f82...a2a1 | 65.3926994000621 |
| DPI / CRO | defi_swap | 0x456a...5481 | 70.6919029186227 |
| DPI / USDC | uniswap_v2 | 0xf298...36aa | 64.6683409167 |
| DPI / AMIS | uniswap_v2 | 0x4c57...0570 | 60.8602808699 |
| DPI / [invalid] | uniswap_v2 | 0x617b...ee83 | 91.6472200926 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.