Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
DYDX / WETH | sushiswap | 0xe4eb...9430 | 0.631684231246744 |
DYDX / WETH 1% | uniswap_v3 | 0xe0cf...c2c3 | 0.628701067401281 |
DYDX / ETH 1% | uniswap-v4-ethereum | 0x1dd3...bf83 | 0.626969737301495 |
DYDX / WETH 0.3% | uniswap_v3 | 0xd8de...36c0 | 0.619203632833019 |
DYDX / WETH | uniswap_v2 | 0xf660...a5f8 | 0.638479878764383 |
DYDX / WETH | curve | 0x8b0a...5abd | 0.489005226774967 |
TRB / DYDX 1% | uniswap_v3 | 0xbf9b...6969 | 0.621033591029876 |
DYDX / VVV | uniswap_v2 | 0xc3a7...8b1a | 0.528598293992822 |
DYDX / WETH 1% | sushiswap-v3-ethereum | 0xf21c...7941 | 2.1380397363 |
DYDX / DAI 1% | uniswap_v3 | 0x3c7e...d185 | 1.0226701024 |
DYDX / USDT 0.3% | uniswap_v3 | 0x6c4a...8b3c | 8.7664197904 |
DYDX / USDC | sushiswap | 0xd59c...e8f6 | 0.622571758709026 |
DYDX / WETH 0.05% | uniswap_v3 | 0x8368...9d4b | 10.9778863864993 |
DYDX / USDT | uniswap_v2 | 0x2260...cc53 | 0.5513926335 |
DYDX / USDC 1% | uniswap_v3 | 0xe141...7abd | 1.6839647876 |
DYDX / UNI 0.3% | uniswap_v3 | 0xed7c...f6a6 | 1.493147078922831061248005551285 |
BUSD / DYDX 1% | uniswap_v3 | 0xb822...ca2c | 2.47178655283257305323626028384 |
DYDX / KABOSU | uniswap_v2 | 0x2042...bb31 | 0.6264490373 |
NFAi / DYDX 1% | uniswap_v3 | 0x8167...9a17 | 2.81103762100337 |
1INCH / DYDX 1% | uniswap_v3 | 0x2151...78e0 | 0.982195551777215 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.