Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
DYDX / WETH 1% | uniswap_v3 | 0xe0cf...c2c3 | 0.597920008878993 |
DYDX / WETH | sushiswap | 0xe4eb...9430 | 0.590180491735498 |
DYDX / WETH 0.3% | uniswap_v3 | 0xd8de...36c0 | 0.59291662226468 |
DYDX / ETH 1% | uniswap-v4-ethereum | 0x1dd3...bf83 | 0.599108558605486 |
DYDX / WETH | uniswap_v2 | 0xf660...a5f8 | 0.594083850040228 |
TRB / DYDX 1% | uniswap_v3 | 0xbf9b...6969 | 0.580625939342233 |
DYDX / WETH | curve | 0x8b0a...5abd | 0.548595718907872 |
DYDX / WETH 1% | sushiswap-v3-ethereum | 0xf21c...7941 | 2.1380397363 |
DYDX / DAI 1% | uniswap_v3 | 0x3c7e...d185 | 1.0226701024 |
DYDX / USDT 0.3% | uniswap_v3 | 0x6c4a...8b3c | 8.7664197904 |
DYDX / VVV | uniswap_v2 | 0xc3a7...8b1a | 0.59063150552486 |
DYDX / USDC | sushiswap | 0xd59c...e8f6 | 0.5586194674 |
DYDX / WETH 0.05% | uniswap_v3 | 0x8368...9d4b | 10.9778863864993 |
DYDX / USDT | uniswap_v2 | 0x2260...cc53 | 0.5490226492 |
DYDX / USDC 1% | uniswap_v3 | 0xe141...7abd | 0.864895957 |
DYDX / UNI 0.3% | uniswap_v3 | 0xed7c...f6a6 | 1.493147078922831061248005551285 |
BUSD / DYDX 1% | uniswap_v3 | 0xb822...ca2c | 2.47178655283257305323626028384 |
DYDX / KABOSU | uniswap_v2 | 0x2042...bb31 | 0.6264490373 |
NFAi / DYDX 1% | uniswap_v3 | 0x8167...9a17 | 2.81103762100337 |
1INCH / DYDX 1% | uniswap_v3 | 0x2151...78e0 | 0.982195551777215 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.