Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
DOLA / DBR / INV | curve | 0xc7de...b19a | 0.995294789775077 |
INV / WETH | curve | 0x6bd8...b171 | 30.9293301136329 |
INV / DOLA 0.3% | uniswap_v3 | 0xbd1f...73c9 | 30.7893030445577 |
INV / USDC / WETH | curve | 0x5426...41ec | 29.3364532455561 |
INV / DOLA 0.3% | balancer_ethereum | 0x441b...6250 | 31.4570608403643 |
INV / WETH | sushiswap | 0x328d...f821 | 30.8861184561516 |
DOLA / INV | sushiswap | 0x5ba6...d002 | 30.7659046986402 |
INV / WETH | uniswap_v2 | 0x73e0...2352 | 31.5262804147688 |
INV / USDC 0.3% | uniswap_v3 | 0xb4e5...6128 | 50.3711204723673 |
INV / WETH 1% | uniswap_v3 | 0x23bb...9858 | 54.4837655261515 |
INV / WETH | curve | 0x2af0...fbae | 44.4260370743847 |
INV / USDC | sushiswap | 0xb233...66de | 33.152819782 |
INV / DOLA | uniswap_v2 | 0xb268...839e | 69.2769902881880201235328055677435243301560760913137751544214268692198274030887446532930985 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.