Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
DIA / USDC 0.3% | uniswap_v3 | 0xa14a...580e | 0.634962662132231 |
DIA / WETH 0.3% | uniswap_v3 | 0xb60b...78b1 | 0.635511577421595 |
DIA / USDC | sushiswap | 0xc965...8078 | 0.635836447706118 |
DIA / WETH | uniswap_v2 | 0x4dc0...ce8d | 0.636642799983892 |
DIA / USDC 1% | uniswap-v4-ethereum | 0xdcd3...140c | 0.643022197882445 |
DIA / ETH 1% | uniswap-v4-ethereum | 0xa496...2600 | 0.636959415027557 |
DIA / USDC | uniswap_v2 | 0xd876...16e9 | 0.582955279735538 |
DIA / WETH | sushiswap | 0xbb7a...7372 | 0.637593356274045 |
DIA / DZAR | uniswap_v2 | 0xce0d...ccce | 0.631629546316329 |
DIA / KABOSU | uniswap_v2 | 0x41de...afbf | 0.3953585534 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.