| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| USDC / fxUSD | curve | 0x5018...b61f | 0.993525435829368 |
| GHO / fxUSD | curve | 0x7434...3c5b | 0.993165437403151 |
| msUSD / fxUSD | curve | 0x138b...6628 | 0.9962380309765768379788461891650168706466434724912011187495835988 |
| fxUSD / frxUSD | curve | 0x8519...cb5e | 0.991152272836793 |
| reUSD / fxUSD | curve | 0xb0ef...a8dc | 0.993453914425191 |
| fxUSD / USDN | curve | 0xb6af...ebaf | 0.992292056827936 |
| USDnr / fxUSD | curve | 0x3204...7cc6 | 1.0000550150511932201902603154558726007469890718819864665356014809 |
| fxUSD / USDC | fluid-ethereum | 0x0c88...743a | 0.999918276638031 |
| fxUSD / USDC / USDaf / BOLD | curve | 0x8b87...c12f | 0.992589193320032 |
| eUSD / fxUSD | curve | 0x16b5...e770 | 0.991684955859651 |
| fxUSD / WETH | curve | 0xb2ee...2d98 | 1.0018415661370563398158404205670995761525205670924904837882015723 |
| ynRWAx / fxUSD | curve | 0xbdf8...b1d8 | 0.994521448411904 |
| DOLA / fxUSD | curve | 0x189b...c7d0 | 0.9978518027307502820766495547403254509785068887809058375850176126 |
| alUSD / fxUSD | curve | 0x27cb...3c9d | 0.996667621358221 |
| fxUSD / rUSD / btcUSD | curve | 0x52bf...ece8 | 0.988480015094501 |
| mkUSD / fxUSD | curve | 0xca55...b5f1 | 0.9929206992 |
| fxUSD / PYUSD | curve | 0xd698...f9b8 | 0.995709743531128 |
| crvUSD / fxUSD | curve | 0x8ffc...fcb2 | 0.990463102195754 |
| rUSD / fxUSD | curve | 0x2116...cfa5 | 0.9924431169 |
| USD0 / fxUSD | curve | 0x74c2...193f | 0.9887807802 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.