| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| USD3 / scrvUSD | curve | 0xe998...2d1e | 1.0874968608346948624809440092931598538526124876034377654541132288 |
| USD3 / sUSDe | curve | 0x9645...9688 | 1.11208516210142 |
| USD3 / sUSDS | curve | 0x65b0...1609 | 1.07455224499048 |
| USD3 / USDM | curve | 0x8999...14ef | 1.0576573771 |
| USD3 / sDAI | curve | 0x0e84...92d4 | 1.10444546793042 |
| USD3 / eUSD | curve | 0x7958...3822 | 1.1342084883 |
| USD3 / rgUSD | curve | 0xde73...ebcd | 1.0559989848 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.