| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| DIVI / WETH | uniswap_v2 | 0x011a...6615 | 0.000418861311675617 |
| DIVI / WETH 0.3% | uniswap_v3 | 0xe936...6566 | 0.0005609913332 |
| DIVI / USDT 1% | uniswap_v3 | 0xe139...f303 | 0.01976906898 |
| DIVI / WETH | sushiswap | 0xab3f...0314 | 0.0008966719213 |
| DVDOGE / DIVI 1% | uniswap_v3 | 0x967b...b661 | 0.00172751471261278 |
| DIVI / USDC 0.3% | uniswap_v3 | 0x3831...7a3b | 0.0094082146172587745042422826439 |
| DIVI / LINK | uniswap_v2 | 0xcce5...01ed | 0.0099327688176078226569341350852929483051456763949545318274783503076042844814048425685096116 |
| DIVI / PRE | uniswap_v2 | 0x7594...af76 | 0.00911390030125068852252259096499322730044106427996382231262348731520836083242869588711311528 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.