| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| USDC / fxUSD | curve | 0x5018...b61f | 0.989968045663626 |
| GHO / fxUSD | curve | 0x7434...3c5b | 0.993597412185349 |
| reUSD / fxUSD | curve | 0xb0ef...a8dc | 0.990598270550791 |
| msUSD / fxUSD | curve | 0x138b...6628 | 0.988120897943723 |
| fxUSD / USDC / USDaf / BOLD | curve | 0x8b87...c12f | 0.990459652875325 |
| fxUSD / USDN | curve | 0xb6af...ebaf | 0.993597412185349 |
| eUSD / fxUSD | curve | 0x16b5...e770 | 0.990465146885686 |
| fxUSD / USDC | fluid-ethereum | 0x0c88...743a | 0.99938196407979 |
| alUSD / fxUSD | curve | 0x27cb...3c9d | 0.988925871611394 |
| ynRWAx / fxUSD | curve | 0xbdf8...b1d8 | 0.989149432144085 |
| mkUSD / fxUSD | curve | 0xca55...b5f1 | 0.9942553091569100128883533405293316402127931184383687348889270406 |
| fxUSD / frxUSD | curve | 0x8519...cb5e | 0.985851786995797063133115850483663099718129981661259792757144142 |
| fxUSD / MIM | curve | 0xd7bf...bceb | 0.988198074615023 |
| fxUSD / rUSD / btcUSD | curve | 0x52bf...ece8 | 1.002209343840404836562399538592519462599266121238006801287939864 |
| DOLA / fxUSD | curve | 0x189b...c7d0 | 0.9945293991844159181619813640962207782587071681476293609037375104 |
| fxUSD / PYUSD | curve | 0xd698...f9b8 | 0.986917146275877 |
| crvUSD / fxUSD | curve | 0x8ffc...fcb2 | 0.998996334603186 |
| rUSD / fxUSD | curve | 0x2116...cfa5 | 0.988817681704184 |
| USD0 / fxUSD | curve | 0x74c2...193f | 0.9887807802 |
| zunUSD / fxUSD | curve | 0x13ea...8cab | 0.9916385153 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.