| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| DBI / WETH | 9inch-ethereum | 0x8072...a86c | 0.0000543065231851671 |
| DBI / USDC | uniswap_v2 | 0xe0ac...2a79 | 0.0000541703887334401 |
| DBI / ODIN | uniswap_v2 | 0x97ee...d09e | 0.0000536318001728896 |
| DBI / WETH 1% | uniswap_v3 | 0x2ca1...17b5 | 0.0000550090939933023 |
| DBI / ETH 0.3% | uniswap-v4-ethereum | 0x096a...543d | 0.000247979383 |
| DBI / 9INCH | 9inch-ethereum | 0x28eb...7e25 | 0.00005719070757 |
| DBI / SPX 0.3% | uniswap-v4-ethereum | 0xb2de...074f | 0.0000561516338424219 |
| hOHM / DBI 0.25% | uniswap-v4-ethereum | 0x214b...2b73 | 0.0003122019483 |
| DBI / WETH | uniswap_v2 | 0xdedf...0c84 | 0.001325295607 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.