| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| DOLA / DBR / INV | curve | 0x66da...d34d | 0.0412168904289478 |
| DBR / DOLA 0.5% | uniswap-v4-ethereum | 0xaa9a...991e | 0.0413948044 |
| DOLA / DBR / INV | curve | 0xc7de...b19a | 0.03788489849 |
| USDC / DBR 99.901% | uniswap-v4-ethereum | 0xe8b3...45c4 | 0.005101615604 |
| DBR / DOLA | curve | 0x056e...b5b6 | 0.0404659236 |
| USDC / DBR 90% | uniswap-v4-ethereum | 0xc334...7e1d | 0.005132535766 |
| DBR / DOLA 0.3% | uniswap_v3 | 0x6a27...4a2c | 0.050790646467901234181258370772132748632001273317049773389 |
| DOLA / DBR 0.3% | balancer_ethereum | 0x4454...2a25 | 0.08532517589 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.