| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| crvUSD / YB | curve | 0xec97...d65b | 0.148857803199477 |
| yYB / YB | curve | 0x5ee9...9daa | 0.152155379711708 |
| YB / WETH 1% | uniswap_v3 | 0x6f58...a38e | 0.1488373435 |
| YB / USDT 1% | uniswap_v3 | 0x2860...c69d | 0.1512530759 |
| sdYB / YB | curve | 0x98b5...9b1a | 0.151468460336214 |
| YB / BTBB | uniswap_v2 | 0x6c6d...2ce5 | 0.1569447954 |
| YB / USDT 4.99% | uniswap-v4-ethereum | 0x1372...810c | 0.6549786779 |
| YB / USDC 5% | uniswap-v4-ethereum | 0x5a41...fcf2 | 0.1516163601 |
| YB / USDT 2% | uniswap-v4-ethereum | 0x5a3e...7367 | 0.3400155859 |
| YB / USDC 0.3% | uniswap-v4-ethereum | 0x8c1a...bb79 | 0.4413823099 |
| YB / sUSDS 0.3% | uniswap-v4-ethereum | 0xfdf7...103f | 0.3802854196 |
| YB / ETH 4.9% | uniswap-v4-ethereum | 0x7102...e788 | 0.414246519 |
| YB / sUSDS | carbon-defi-ethereum | 0xc537...2071 | 0.1228468604 |
| YB / USDC 1% | uniswap-v4-ethereum | 0xdbd6...3fff | 0.5622095963 |
| YB / USDC 4.99% | uniswap-v4-ethereum | 0xdc77...8a65 | 0.8484274725 |
| YB / USDC 0.95% | uniswap-v4-ethereum | 0x859a...b9ca | 0.8038046472 |
| YB / USDC 1% | uniswap_v3 | 0xc29f...f138 | 0.6437109775 |
| YB / CRV 1% | uniswap-v4-ethereum | 0x8786...44d1 | 0.1615837674 |
| YB / USDC 2% | uniswap-v4-ethereum | 0x0c0e...7ed7 | 0.823077777 |
| YB / USDC 50% | uniswap-v4-ethereum | 0x36b3...0166 | 0.1601961475 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.