| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| DAI / USDC / USDT | curve | 0xbebc...f1c7 | 0.9944342053 |
| DAI / USDT 0.007% | uniswap-v4-ethereum | 0xf6e8...277a | 0.9984108116 |
| DAI / USDT 0.01% | uniswap_v3 | 0x48da...1406 | 0.9963727455 |
| DAI / WETH 0.3% | sushiswap-v3-ethereum | 0x769d...e767 | 1.0011616725 |
| DAI / USDC 0.01% | uniswap_v3 | 0x5777...2168 | 0.9963727455 |
| DAI / WETH 0.05% | uniswap_v3 | 0x6059...a270 | 0.9975882594 |
| DAI / WETH | uniswap_v2 | 0xa478...eb11 | 0.9968682924 |
| DAI / WETH 0.3% | uniswap_v3 | 0xc2e9...25f8 | 0.9963252519 |
| DAI / USDC 0.008% | uniswap-v4-ethereum | 0xcd0a...70f0 | 0.9984108116 |
| DAIx1 / DAI 0.01% | uniswap-v4-ethereum | 0x622f...e3b7 | 0.993713391528954 |
| REQ / DAI | uniswap_v2 | 0x5522...ab83 | 0.996870299391813 |
| TENSOR / DAI | uniswap_v2 | 0x0a09...01bf | 1.00270649070726 |
| PEAS / DAI 1% | uniswap_v3 | 0xae75...9160 | 1.00223255666552 |
| PAXG / DAI 0.05% | uniswap-v4-ethereum | 0x6924...39be | 0.997567889405231 |
| DAI / USDT 0.01% | uniswap-v4-ethereum | 0xc743...35fd | 0.9976190822 |
| DAI / ETH 0.3% | uniswap-v4-ethereum | 0x042a...ef69 | 0.9995504344 |
| DAI / USDS 0.3% | uniswap_v3 | 0xe9f1...6c67 | 0.9960002762 |
| DAI / USDC / USDT 0.005% | balancer_ethereum | 0x06df...1b42 | 0.996869724 |
| DAI / USDT | dodo-pmm-ethereum | 0x3058...5d73 | 1.0016248703 |
| USDe / DAI | curve | 0xf36a...c67d | 1.000238122661255940814425593086565483764237218189900225126442608 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.