| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| DBI / WETH | 9inch-ethereum | 0x8072...a86c | 0.0000864195365534977 |
| DBI / USDC | uniswap_v2 | 0xe0ac...2a79 | 0.0000868571072918495 |
| DBI / ODIN | uniswap_v2 | 0x97ee...d09e | 0.0000865464842853284 |
| DBI / 9INCH | 9inch-ethereum | 0x28eb...7e25 | 0.0000868299652601835 |
| DBI / SPX 0.3% | uniswap-v4-ethereum | 0xb2de...074f | 0.0000856310970690217 |
| DBI / WETH 1% | uniswap_v3 | 0x2ca1...17b5 | 0.0000877533304113491 |
| DBI / ETH 0.3% | uniswap-v4-ethereum | 0x096a...543d | 0.000247979383 |
| hOHM / DBI 0.25% | uniswap-v4-ethereum | 0x214b...2b73 | 0.0003122019483 |
| DBI / WETH | uniswap_v2 | 0xdedf...0c84 | 0.001325295607 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.