| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| USD3 / sUSDe | curve | 0x9645...9688 | 0.8482633588 |
| USD3 / scrvUSD | curve | 0xe998...2d1e | 0.8484169214 |
| USD3 / sUSDS | curve | 0x65b0...1609 | 0.8643932385 |
| USD3 / USDM | curve | 0x8999...14ef | 0.8061868417 |
| USD3 / sDAI | curve | 0x0e84...92d4 | 1.0754476295 |
| USD3 / eUSD | curve | 0x7958...3822 | 1.1342084883 |
| USD3 / rgUSD | curve | 0xde73...ebcd | 1.0559989848 |
| USD3 / ETH+ | curve | 0x06a2...536e | 0.990073514890914 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.