| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| DBI / WETH | 9inch-ethereum | 0x8072...a86c | 0.0000486508942450214 |
| DBI / USDC | uniswap_v2 | 0xe0ac...2a79 | 0.0000492766689966846 |
| DBI / WETH 1% | uniswap_v3 | 0x2ca1...17b5 | 0.0000507567218140592 |
| DBI / ODIN | uniswap_v2 | 0x97ee...d09e | 0.000049600472553803 |
| DBI / 9INCH | 9inch-ethereum | 0x28eb...7e25 | 0.0000499605101147383 |
| DBI / SPX 0.3% | uniswap-v4-ethereum | 0xb2de...074f | 0.0000499663583454457 |
| DBI.5 / DBI | uniswap_v2 | 0xc17a...b0d0 | 0.00227639746824358 |
| DBI / ETH 0.3% | uniswap-v4-ethereum | 0x096a...543d | 0.000247979383 |
| DBI / USDC 1% | uniswap_v3 | 0xb059...4b9c | 0.00695173064428352662151773897196 |
| DBI / SHIB 1% | uniswap_v3 | 0xb8fa...c3db | 0.00905166847126170295999104774956 |
| hOHM / DBI 0.25% | uniswap-v4-ethereum | 0x214b...2b73 | 0.0003122019483 |
| DBI / FTM 1% | uniswap_v3 | 0x0b09...c28f | 0.00443361202718057 |
| HEX / DBI 1% | uniswap_v3 | 0xd1b2...7bff | 0.00876809639915145944965841936834 |
| DBI / LINK 1% | uniswap_v3 | 0xf4e9...1451 | 0.01349073056045290484486489635178 |
| DBI / BONE | shibaswap | 0x07a2...4510 | 0.00391757749982732879650865551893404348091115487794375774498836614282130485184600628789825338 |
| HEX / DBI | uniswap_v2 | 0xb45d...8545 | 0.00433621533615857 |
| DBI / WETH | uniswap_v2 | 0xdedf...0c84 | 0.001325295607 |
| DBI / PP 1% | uniswap_v3 | 0x4f7d...7821 | 0.00082165538770033398200803652582 |
| DBI / DBI 1% | uniswap_v3 | 0x9393...348f | 0.00100191265322588 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.