| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| DYDX / WETH | sushiswap | 0xe4eb...9430 | 0.0370447750301899 |
| DYDX / WETH | uniswap_v2 | 0xf660...a5f8 | 0.0354662237344122 |
| DYDX / ETH 1% | uniswap-v4-ethereum | 0x1dd3...bf83 | 0.0359751527349762 |
| DYDX / WETH | curve | 0x8b0a...5abd | 0.0358477245038312 |
| DYDX / WETH 0.3% | uniswap_v3 | 0xd8de...36c0 | 0.6210014363 |
| DYDX / USDC 9.8% | uniswap-v4-ethereum | 0xb104...25ed | 0.04110383225 |
| DYDX / WETH 1% | uniswap_v3 | 0xe0cf...c2c3 | 0.1579122414 |
| DYDX / USDT 15% | uniswap-v4-ethereum | 0x147f...c864 | 0.0599424062 |
| DYDX / USDT 20% | uniswap-v4-ethereum | 0xfe06...f5aa | 0.0506065484 |
| DYDX / USDC 4.98% | uniswap-v4-ethereum | 0x0a82...05e2 | 0.05042527552 |
| DYDX / USDC 19.88% | uniswap-v4-ethereum | 0x5918...c701 | 0.100139671 |
| DYDX / USDT 10% | uniswap-v4-ethereum | 0x444b...2e19 | 0.0424355740084579 |
| DYDX / USDT 0.3% | uniswap_v3 | 0x6c4a...8b3c | 8.7664197904 |
| TRB / DYDX 1% | uniswap_v3 | 0xbf9b...6969 | 0.03168560334 |
| DYDX / DAI 1% | uniswap_v3 | 0x3c7e...d185 | 0.9688361647 |
| DYDX / VVV | uniswap_v2 | 0xc3a7...8b1a | 0.0398126052301604 |
| DYDX / USDC | sushiswap | 0xd59c...e8f6 | 0.0351499807956178 |
| DYDX / USDC 1% | uniswap_v3 | 0xe141...7abd | 0.1052118087 |
| DYDX / USDT 1% | uniswap-v4-ethereum | 0x3fb6...65b3 | 0.08642141134 |
| DYDX / USDT | uniswap_v2 | 0x2260...cc53 | 0.0751053579 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.