| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| crvUSD / tBTC | curve | 0xf1f4...6127 | 88471.21988666011343384402632742477878098191165319864669150911059 |
| tBTC / WBTC | curve | 0xb7ec...6726 | 88297.6692227677 |
| tBTC / WBTC 0.01% | uniswap_v3 | 0x73a3...b38b | 89198.9429248922 |
| tBTC / cbBTC | curve | 0xae6e...0bb3 | 88826.7569951673 |
| tBTC / cbBTC 0.01% | uniswap_v3 | 0x1715...7428 | 89181.1200911441 |
| crvUSD / tBTC / wstETH | curve | 0x2889...3d13 | 88841.3685587723 |
| tBTC / WBTC 0.05% | uniswap_v3 | 0xdbac...647c | 88491.4815547677 |
| tBTC / WETH 0.3% | uniswap_v3 | 0x9794...49cc | 89361.969768912 |
| tBTC / MUSD 0.05% | uniswap-v4-ethereum | 0x0dd1...8183 | 88857.174533439 |
| EBTC / tBTC | curve | 0x272b...c401 | 88471.20955470706536500501266156946604054775443657305986970173872 |
| tBTC / ETH 0.2% | uniswap-v4-ethereum | 0xe1a0...15c0 | 89376.7455373777 |
| tBTC / WBTC 0.05% | uniswap-v4-ethereum | 0xef3b...290a | 89401.3765972674 |
| stBTC / tBTC | curve | 0xf7ac...139f | 87972.4591887334 |
| tBTC / WBTC 0.05% | blueprint | 0x89bf...fe12 | 89206.2716078456 |
| tBTC / cbBTC 0.08% | uniswap-v4-ethereum | 0xea07...d504 | 89214.1593985093 |
| tBTC / FRAX / frxETH | curve | 0x4d19...825b | 91419.4334292836 |
| tBTC / T 0.5% | balancer_ethereum | 0x6228...f6fb | 88445.2698380246 |
| tBTC / WBTC 0.01% | uniswap-v4-ethereum | 0x5631...0d13 | 111520.309065661 |
| zunBTC / tBTC | curve | 0x6fbc...8035 | 106908.679475433 |
| tBTC / thUSD | curve | 0xb79b...2b7f | 83795.5054120984 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.