| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| DOLA / sUSDe | curve | 0x7447...92ef | 0.984324126991725 |
| DOLA / wstUSR | curve | 0x6427...0452 | 0.983977542758503 |
| DOLA / sUSDS | curve | 0x8b83...f710 | 0.984324126991725 |
| DOLA / DBR / INV | curve | 0x66da...d34d | 0.984324126991725 |
| DOLA / USR | curve | 0x38de...f76e | 0.983594856194594 |
| DOLA / scrvUSD | curve | 0xff17...8b3c | 0.987451529454242 |
| DOLA / fxSAVE | curve | 0x2b85...aaed | 0.99167900173608022507989376002718887522752456496497972030511115 |
| DOLA / crvFRAX | curve | 0xe571...884d | 0.99407235510045940362484103993580014148751851271447853560208568 |
| DOLA / WETH | uniswap_v2 | 0xecfb...38e5 | 0.989784568103711 |
| INV / DOLA 1% | uniswap-v4-ethereum | 0x0844...69ed | 0.993244257634553 |
| DOLA / 3Crv | curve | 0xaa5a...927d | 0.987451529454242 |
| INV / DOLA 0.3% | balancer_ethereum | 0x441b...6250 | 0.996509251819454 |
| DOLA / crvUSD | curve | 0x8272...063b | 0.985362846117033 |
| DOLA / INV | sushiswap | 0x5ba6...d002 | 0.993155822517496 |
| DOLA / 3Crv | curve | 0x9547...0e8c | 0.987451529454242 |
| DOLA / DBR / INV | curve | 0xc7de...b19a | 0.994905366047153033956511644522213698416228128407709855043298267 |
| DOLA / USDC 0.04% | balancer_ethereum | 0xff4c...5ea6 | 0.996509251819454 |
| FRAXPYUSD / DOLA | curve | 0xef48...f95e | 0.9953950614 |
| DOLA / fxUSD | curve | 0x189b...c7d0 | 0.992447448374610660904081677647196572074203610520318970151159668 |
| INV / DOLA 0.3% | uniswap_v3 | 0xbd1f...73c9 | 0.9932774238 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.