Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
DOLA / sUSDe | curve | 0x7447...92ef | 0.999994149266476209583278094522671912153643644605751438190905166 |
DOLA / USR | curve | 0x38de...f76e | 0.990806588262457 |
DOLA / sUSDS | curve | 0x8b83...f710 | 0.998760107419667394911579963548053957063076671664877485754582104 |
DOLA / scrvUSD | curve | 0xff17...8b3c | 0.988071068331173 |
DOLA / DBR / INV | curve | 0xc7de...b19a | 0.997038652775160279049845974811304779293978101074863021778239878 |
DOLA / crvUSD | curve | 0x8272...063b | 0.985140488982682 |
DOLA / crvFRAX | curve | 0xe571...884d | 0.988071068331173 |
DOLA / fxUSD | curve | 0x189b...c7d0 | 0.994225526354158 |
INV / DOLA 0.3% | uniswap_v3 | 0xbd1f...73c9 | 0.989695433317322 |
DOLA / deUSD | curve | 0x6691...bdc4 | 0.983915754464407 |
DOLA / WETH | uniswap_v2 | 0xecfb...38e5 | 0.997262041648905 |
FRAXPYUSD / DOLA | curve | 0xef48...f95e | 0.99358804534935 |
INV / DOLA 0.3% | balancer_ethereum | 0x441b...6250 | 1.00042669269189 |
DOLA / INV | sushiswap | 0x5ba6...d002 | 1.00042669269189 |
DOLA / 3Crv | curve | 0xaa5a...927d | 0.989794852851879 |
DOLA / USDC 0.04% | balancer_ethereum | 0xff4c...5ea6 | 0.997781728802095 |
DOLA / 3Crv | curve | 0x9547...0e8c | 0.992276739129571 |
DOLA / CUSD 0.04% | balancer_ethereum | 0x384f...ea5d | 0.998311654778255 |
DOLA / fETH | curve | 0x294b...19d6 | 0.993459883791073 |
DOLA / USDC 0.3% | uniswap_v3 | 0x7c08...8cfb | 0.994100039 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.