Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
cDAI / cUSDC / USDT | curve | 0x52ea...d85c | 0.00000000000002465303183 |
cDAI / WETH | uniswap_v2 | 0x9896...8a5a | 0.0247481634958052 |
cDAI / cUSDC | curve | 0xa2b4...7a56 | 0.00000000000002515413817 |
cDAI / DAI 0.05% | uniswap_v3 | 0x53c0...8f41 | 0.02297630741 |
cDAI / DAI | sushiswap | 0x0cfe...027e | 0.02549377231 |
cDAI / DAI | uniswap_v2 | 0x64ec...820f | 0.02407369878 |
cDAI / WETH 0.3% | uniswap_v3 | 0x82bd...aedc | 0.02637356646 |
UNI / cDAI | uniswap_v2 | 0xcc77...7e1c | 0.02896791927 |
cDAI / USDT | uniswap_v2 | 0x252a...75e3 | 0.023208713287885 |
cDAI / WETH | sushiswap | 0xf82b...f5a0 | 0.01312714616 |
cDAI / COMP | uniswap_v2 | 0x8364...36ff | 0.0007813133351 |
cDAI / DAI 0.01% | uniswap_v3 | 0xbcc4...c5da | 0.0212161566619141539570047435616 |
cDAI / WETH 1% | uniswap_v3 | 0x5c0f...a3e6 | 0.000000000000000000000000000000000000000000000444893384877706 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.