Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
DIVI / WETH | uniswap_v2 | 0x011a...6615 | 0.000739031951710179 |
DIVI / WETH 0.3% | uniswap_v3 | 0xe936...6566 | 0.0009986103254 |
DIVI / USDT 1% | uniswap_v3 | 0xe139...f303 | 0.05093805433 |
DIVI / WETH | sushiswap | 0xab3f...0314 | 0.003810105373 |
DVDOGE / DIVI 1% | uniswap_v3 | 0x967b...b661 | 0.00172751471261278 |
DIVI / USDC 0.3% | uniswap_v3 | 0x3831...7a3b | 0.0094082146172587745042422826439 |
DIVI / LINK | uniswap_v2 | 0xcce5...01ed | 0.0099327688176078226569341350852929483051456763949545318274783503076042844814048425685096116 |
DIVI / PRE | uniswap_v2 | 0x7594...af76 | 0.00911390030125068852252259096499322730044106427996382231262348731520836083242869588711311528 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.