| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| DOLA / sUSDe | curve | 0x7447...92ef | 0.988663124967618 |
| DOLA / wstUSR | curve | 0x6427...0452 | 0.989702364202882 |
| DOLA / sUSDS | curve | 0x8b83...f710 | 0.989702364202882 |
| DOLA / DBR / INV | curve | 0x66da...d34d | 0.989702364202882 |
| DOLA / USR | curve | 0x38de...f76e | 0.988191056235596 |
| DOLA / scrvUSD | curve | 0xff17...8b3c | 0.990800603111306 |
| DOLA / fxSAVE | curve | 0x2b85...aaed | 0.987138213834977 |
| DOLA / WETH | uniswap_v2 | 0xecfb...38e5 | 0.999824704357996 |
| DOLA / crvFRAX | curve | 0xe571...884d | 0.987956062672038 |
| DOLA / crvUSD | curve | 0x8272...063b | 1.0003318012522294395409621939285225664895201720306473320328715856 |
| INV / DOLA 0.3% | balancer_ethereum | 0x441b...6250 | 0.996599780315865 |
| INV / DOLA 1% | uniswap-v4-ethereum | 0x0844...69ed | 0.993770576818476 |
| DOLA / 3Crv | curve | 0xaa5a...927d | 0.996275662647369 |
| DOLA / INV | sushiswap | 0x5ba6...d002 | 0.998005285735194 |
| DOLA / DBR / INV | curve | 0xc7de...b19a | 0.994563015540256 |
| DOLA / USDC 0.04% | balancer_ethereum | 0xff4c...5ea6 | 0.996599780315865 |
| DOLA / deUSD | curve | 0x6691...bdc4 | 0.991421555342473 |
| DOLA / WETH | sushiswap | 0x2006...95dc | 1.03121243330959 |
| FRAXPYUSD / DOLA | curve | 0xef48...f95e | 0.988080133994556 |
| DOLA / 3Crv | curve | 0x9547...0e8c | 0.991495626353737 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.