| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| EUROC / USDC 0.05% | uniswap_v3 | 0x95db...73d6 | 1.18365740201214 |
| EUROC / USDC 0.05% | uniswap-v4-ethereum | 0x77ef...c702 | 1.18631470473161 |
| EUROC / XAUt 0.3% | uniswap_v3 | 0xd9b1...7d0f | 1.18344613296048 |
| EUROC / ETH 1% | uniswap-v4-ethereum | 0xfeb8...f6bc | 1.18438650725289 |
| EUROC / EURCV 0.05% | uniswap_v3 | 0x6427...63c0 | 1.18640667182498 |
| agEUR / EUROC | curve | 0xba34...cc73 | 1.1785915970275 |
| EUROC / EURe 0.08% | uniswap-v4-ethereum | 0xabd9...c823 | 1.18545506208063 |
| EUROC / WETH 0.3% | uniswap_v3 | 0x6637...d801 | 1.18350340993264 |
| EUROC / EURCV 0.05% | pancakeswap-v3-ethereum | 0x83d1...e972 | 1.18452343624681 |
| EUROC / EURCV 0.05% | uniswap-v4-ethereum | 0x0512...33bb | 1.1858121899253 |
| EUROC / JPYC 0.3% | uniswap-v4-ethereum | 0x11e6...0d1c | 1.18597763803873 |
| EUROC / EURS / EURQ | curve | 0x48ed...63d4 | 1.17791183349261 |
| EUROC / MORPHO 1% | uniswap-v4-ethereum | 0x264f...5673 | 1.18481484184267 |
| EUROC / COW 1% | uniswap-v4-ethereum | 0xf000...8aee | 1.18619381632509 |
| EUROC / WETH 0.25% | pancakeswap-v3-ethereum | 0xd2c3...b443 | 1.17887758988993 |
| RLUSD / EUROC | curve | 0x38b6...a11b | 1.17862358085278 |
| EUROC / USDC | uniswap_v2 | 0xcadb...25f2 | 1.18617091833942 |
| EUROC / sUSDe | uniswap_v2 | 0xd141...fab1 | 1.19103484768516 |
| EUROC / ZIK 1% | uniswap-v4-ethereum | 0x3584...15df | 1.18198897342779 |
| EUROC / PRO 0.3% | uniswap_v3 | 0xdd20...af7d | 1.18699433780344 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.