Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
DAI / USDC / USDT | curve | 0xbebc...f1c7 | 0.996474315568255 |
DAI / USDC 0.01% | uniswap_v3 | 0x5777...2168 | 0.996740977324349 |
DAI / USDT 0.01% | uniswap_v3 | 0x48da...1406 | 0.996740977324349 |
DAI / WETH | uniswap_v2 | 0xa478...eb11 | 0.996781360961707 |
DAI / WETH | sushiswap | 0xc3d0...882f | 0.996888828597934 |
DAI / USDT 0.007% | uniswap-v4-ethereum | 0xf6e8...277a | 0.995240891239075 |
DAI / WETH 0.05% | uniswap_v3 | 0x6059...a270 | 1.00108304613644 |
DAI / USDC 0.05% | uniswap_v3 | 0x6c6b...3700 | 0.996577471432717 |
DAI / WETH 0.3% | uniswap_v3 | 0xc2e9...25f8 | 1.00245481477285 |
PEAS / DAI 1% | uniswap_v3 | 0xae75...9160 | 0.996740789735425 |
DAI / USDC 0.008% | uniswap-v4-ethereum | 0xcd0a...70f0 | 0.995240433929755 |
DAI / USDS 0.3% | uniswap_v3 | 0xe9f1...6c67 | 0.996740977324349 |
PAXG / DAI 0.05% | uniswap-v4-ethereum | 0x6924...39be | 0.99594654362787 |
DAI / ETH 0.3% | uniswap-v4-ethereum | 0x042a...ef69 | 1.00138168610097 |
DAI / USDC / USDT 0.005% | balancer_ethereum | 0x06df...1b42 | 0.996826936175208 |
HEX / DAI 0.3% | uniswap-v4-ethereum | 0x344b...bcf7 | 0.997995507022619 |
TENSOR / DAI | uniswap_v2 | 0x0a09...01bf | 0.999214863850503 |
USDe / DAI | curve | 0xf36a...c67d | 0.992184430046723 |
RAIL / DAI | sushiswap | 0x7f51...7e02 | 0.996829202487721 |
DAI / WETH 0.05% | balancer_ethereum | 0x0b09...2a35 | 1.00024984870089 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.