Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
INV / WETH | curve | 0x6bd8...b171 | 53.5627696442150594511696913987590845087357286668760007192243671 |
DOLA / DBR / INV | curve | 0xc7de...b19a | 0.990318462741002 |
INV / DOLA 0.3% | uniswap_v3 | 0xbd1f...73c9 | 53.7799936097493 |
INV / WETH | sushiswap | 0x328d...f821 | 53.9211624079387 |
INV / USDC / WETH | curve | 0x5426...41ec | 53.4542294118902 |
INV / DOLA 0.3% | balancer_ethereum | 0x441b...6250 | 53.7424939510919 |
DOLA / INV | sushiswap | 0x5ba6...d002 | 53.7450865473813 |
INV / WETH | uniswap_v2 | 0x73e0...2352 | 54.1038738157988 |
INV / USDC 0.3% | uniswap_v3 | 0xb4e5...6128 | 50.3711204723673 |
INV / WETH 1% | uniswap_v3 | 0x23bb...9858 | 54.4837655261515 |
INV / WETH | curve | 0x2af0...fbae | 44.4260370743847 |
INV / USDC | sushiswap | 0xb233...66de | 31.1350869573 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.