| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| DAI / USDC / USDT | curve | 0xbebc...f1c7 | 0.9915405872 |
| DAI / USDT 0.007% | uniswap-v4-ethereum | 0xf6e8...277a | 0.999655376 |
| DAI / USDT 0.01% | uniswap_v3 | 0x48da...1406 | 0.9970018238 |
| DAI / WETH 0.3% | sushiswap-v3-ethereum | 0x769d...e767 | 0.9964195977 |
| DAI / USDC 0.01% | uniswap_v3 | 0x5777...2168 | 0.9970628617 |
| DAI / WETH 0.05% | uniswap_v3 | 0x6059...a270 | 0.9976623114 |
| DAI / WETH | uniswap_v2 | 0xa478...eb11 | 0.9967532607 |
| DAI / WETH 0.3% | uniswap_v3 | 0xc2e9...25f8 | 0.9963982801 |
| DAI / USDC 0.008% | uniswap-v4-ethereum | 0xcd0a...70f0 | 0.9958833684 |
| DAIx1 / DAI 0.01% | uniswap-v4-ethereum | 0x622f...e3b7 | 0.996822927155059 |
| REQ / DAI | uniswap_v2 | 0x5522...ab83 | 1.00180746549293 |
| PAXG / DAI 0.05% | uniswap-v4-ethereum | 0x6924...39be | 0.997654532147892 |
| TENSOR / DAI | uniswap_v2 | 0x0a09...01bf | 1.0020462170019 |
| PEAS / DAI 1% | uniswap_v3 | 0xae75...9160 | 1.00223255666552 |
| DAI / ETH 0.3% | uniswap-v4-ethereum | 0x042a...ef69 | 0.999734749 |
| DAI / USDS 0.3% | uniswap_v3 | 0xe9f1...6c67 | 0.9960002762 |
| DAI / USDC / USDT 0.005% | balancer_ethereum | 0x06df...1b42 | 0.9967283518 |
| DAI / USDT 0.01% | uniswap-v4-ethereum | 0xc743...35fd | 0.9997052586 |
| DAI / USDT | dodo-pmm-ethereum | 0x3058...5d73 | 1.0076548237 |
| DAI / WETH 0.05% | balancer_ethereum | 0x0b09...2a35 | 0.9962363938 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.