| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| wstUSR / RLP | curve | 0x42cf...0889 | 0.1327524926 |
| DOLA / wstUSR | curve | 0x6427...0452 | 0.158766108160679 |
| wstUSR / USDC | fluid-ethereum | 0xd64e...d9fd | 1.1303839864 |
| wstUSR / USDT 98% | uniswap-v4-ethereum | 0xacc3...0e34 | 0.0118912228 |
| wstUSR / USDT 99.01% | uniswap-v4-ethereum | 0xd4fa...248d | 0.05260193032 |
| wstUSR / GYD 0.01% | balancer_ethereum | 0xc89f...a826 | 1.1142463137 |
| wstUSR / ETH 97% | uniswap-v4-ethereum | 0x7351...e61e | 0.01281881341 |
| wstUSR / ETH 95% | uniswap-v4-ethereum | 0xda76...b7d1 | 0.00990453836 |
| wstUSR / USDT 99.1% | uniswap-v4-ethereum | 0x5ed3...39cb | 0.07953092462 |
| wstUSR / USDT 89% | uniswap-v4-ethereum | 0x40bd...b8cf | 0.1174748193 |
| wstUSR / USDC 25% | uniswap-v4-ethereum | 0xab38...fd40 | 1.4980134203 |
| wstUSR / USDC 80% | uniswap-v4-ethereum | 0xe2a8...6140 | 0.06269381465 |
| wstUSR / USDT 87% | uniswap-v4-ethereum | 0x8b67...bea9 | 0.2345727724 |
| wstUSR / ETH 99% | uniswap-v4-ethereum | 0x0b5f...5abf | 0.00743172252 |
| wstUSR / USDC 0.01% | uniswap-v4-ethereum | 0xb9d6...9f19 | 1.0093173034 |
| wstUSR / USDC 30% | uniswap-v4-ethereum | 0xe437...2aee | 0.6160734166 |
| wstUSR / USDT 25% | uniswap-v4-ethereum | 0x6cf1...9110 | 1.147086692 |
| PT-wstUSR-1740182579 / wstUSR | curve | 0x0d89...6064 | 0.01219195648 |
| wstUSR / USDC 98.63% | uniswap-v4-ethereum | 0x7e4a...a5f0 | 0.09591223503 |
| wstUSR / USDT 88% | uniswap-v4-ethereum | 0xccc9...02a8 | 1.0800861442 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.