| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| DOLA / DBR / INV | curve | 0x66da...d34d | 0.989486480603904 |
| INV / WETH | curve | 0xdcd9...19ec | 27.2407731025367 |
| INV / USDC / WETH | curve | 0x5426...41ec | 27.4569994909914 |
| INV / DOLA 1% | uniswap-v4-ethereum | 0x0844...69ed | 27.7612459549481 |
| INV / WETH | sushiswap | 0x328d...f821 | 27.5789702563084 |
| INV / DOLA 0.3% | balancer_ethereum | 0x441b...6250 | 27.617922311574 |
| DOLA / INV | sushiswap | 0x5ba6...d002 | 27.6531638798248 |
| DOLA / DBR / INV | curve | 0xc7de...b19a | 0.994563015540256 |
| INV / WETH | uniswap_v2 | 0x73e0...2352 | 27.4318159097971 |
| INV / DOLA 0.3% | uniswap_v3 | 0xbd1f...73c9 | 34.137708158 |
| INV / WETH 1% | uniswap_v3 | 0x23bb...9858 | 30.9425442598 |
| INV / WETH | curve | 0x6bd8...b171 | 34.688191683 |
| INV / USDC | sushiswap | 0xb233...66de | 31.1350869573 |
| INV / WETH 0.3% | uniswap_v3 | 0x9465...ad5e | 31.4329052087 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.