| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| yUSD / USDC 20% | uniswap-v4-ethereum | 0xa7c8...6db2 | 0.780883166944619 |
| yUSD / USDT 99.982% | uniswap-v4-ethereum | 0xc173...8298 | 0.3602529214 |
| yUSD / USDT 99.21% | uniswap-v4-ethereum | 0xefcf...a21c | 0.3060650829 |
| yUSD / USDT 99.21% | uniswap-v4-ethereum | 0x05a0...6a74 | 0.5796150529 |
| yUSD / USDT 99.976% | uniswap-v4-ethereum | 0xe9f3...1b73 | 0.504667642 |
| yUSD / USDC 49.3% | uniswap-v4-ethereum | 0x2d9d...863f | 0.5131706075 |
| yUSD / USDC 94% | uniswap-v4-ethereum | 0x3b6e...22b0 | 0.1881557655 |
| yUSD / USDC 50% | uniswap-v4-ethereum | 0x756f...c01e | 0.4715223234 |
| yUSD / USDC 95% | uniswap-v4-ethereum | 0xb5fe...592a | 0.1289488269 |
| yUSD / USDT 95% | uniswap-v4-ethereum | 0xc06f...158d | 0.2134576056 |
| PT-yUSD@16/6/2025 / yUSD | curve | 0x2f3a...c697 | 1.077446923 |
| yUSD / USDC 96% | uniswap-v4-ethereum | 0xcf23...dcb0 | 0.5559609616 |
| yUSD / USDT 99.983% | uniswap-v4-ethereum | 0x0f05...ac0e | 0.3930033982 |
| yUSD / USDC 75.5% | uniswap-v4-ethereum | 0x83ac...bab6 | 0.3636503932 |
| yUSD / sDOLA | curve | 0x4cb8...6521 | 1.1137057008 |
| yUSD / USDC | curve | 0x8130...6d3a | 0.9539623704 |
| yUSD / USR | curve | 0x4e32...bb29 | 0.4585962172 |
| yUSD / USDC 0.01% | uniswap_v3 | 0xf453...5ea5 | 0.9997174286 |
| xUSD / yUSD | curve | 0xcb6d...b3ba | 0.0001677387425 |
| PT-yUSD@25/9/2025 / yUSD | curve | 0x0ffc...fd8a | 1.1052948221 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.