| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| GUSD / 3Crv | curve | 0x4f06...7956 | 0.99910621702752 |
| GUSD / USDC 0.05% | uniswap_v3 | 0x5aa1...5c61 | 0.995357239107875 |
| GUSD / USDC 0.3% | uniswap_v3 | 0x93f2...095c | 0.99769619068648 |
| GUSD / WETH 0.3% | uniswap_v3 | 0x4ba9...97de | 0.987231461616277 |
| GUSD / DAI 0.05% | uniswap_v3 | 0x7cf1...47b9 | 0.994794166411063 |
| GUSD / WETH | uniswap_v2 | 0x6124...e701 | 1.02468084972358 |
| GUSD / crvFRAX | curve | 0x4e43...8d93 | 1.0004970124 |
| GUSD / crvUSD | curve | 0xecdd...db07 | 1.0313034691 |
| GUSD / USDT 0.3% | uniswap_v3 | 0x951c...a69d | 0.9903691301 |
| GUSD / USDC | uniswap_v2 | 0x03b0...da35 | 0.9912274148 |
| GUSD / XYO | sushiswap | 0xd442...7f4f | 1.0006491611 |
| GUSD / FRAX 0.05% | uniswap_v3 | 0x5de4...34b7 | 0.993325160094265 |
| GUSD / WETH 0.3% | sushiswap-v3-ethereum | 0x41c9...2201 | 0.9573195327 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.