Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
DOLA / DBR / INV | curve | 0xc7de...b19a | 0.994884371258018 |
INV / WETH | curve | 0x6bd8...b171 | 27.1592799868701 |
INV / DOLA 0.3% | uniswap_v3 | 0xbd1f...73c9 | 26.7597333230493 |
INV / WETH | sushiswap | 0x328d...f821 | 27.2865923679534 |
INV / USDC / WETH | curve | 0x5426...41ec | 27.4897229695077 |
INV / DOLA 0.3% | balancer_ethereum | 0x441b...6250 | 27.9171536144441 |
DOLA / INV | sushiswap | 0x5ba6...d002 | 27.1492723882257 |
INV / WETH | uniswap_v2 | 0x73e0...2352 | 27.0230484195563 |
INV / USDC 0.3% | uniswap_v3 | 0xb4e5...6128 | 50.3711204723673 |
INV / WETH 1% | uniswap_v3 | 0x23bb...9858 | 54.4837655261515 |
INV / WETH | curve | 0x2af0...fbae | 44.4260370743847 |
INV / DOLA | uniswap_v2 | 0xb268...839e | 69.2769902881880201235328055677435243301560760913137751544214268692198274030887446532930985 |
INV / USDC | sushiswap | 0xb233...66de | 26.5178983498587 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.