| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| EUROC / USDC 0.05% | uniswap_v3 | 0x95db...73d6 | 1.17099349292203 |
| EUROC / ETH 1% | uniswap-v4-ethereum | 0xfeb8...f6bc | 1.16928291288424 |
| agEUR / EUROC | curve | 0xba34...cc73 | 1.15894337442232 |
| EUROC / USDC 0.05% | uniswap-v4-ethereum | 0x77ef...c702 | 1.16762022494676 |
| EUROC / RLUSD 0.05% | balancer-v3-ethereum | 0x0629...d7a3 | 1.16818278557029 |
| EUROC / XAUt 0.3% | uniswap_v3 | 0xd9b1...7d0f | 1.16794167634246 |
| EUROC / RLUSD 0.05% | balancer-v3-ethereum | 0x504a...af11 | 1.16886252635179 |
| EUROC / WETH 0.3% | uniswap_v3 | 0x6637...d801 | 1.17099307984322 |
| EUROC / EURe 0.08% | uniswap-v4-ethereum | 0xabd9...c823 | 1.16925033824656 |
| EUROC / JPYC 0.3% | uniswap-v4-ethereum | 0x11e6...0d1c | 1.16638337155671 |
| EUROC / EURS / EURQ | curve | 0x48ed...63d4 | 1.16068419610645 |
| EUROC / JPYC 0.05% | uniswap-v4-ethereum | 0x4661...d370 | 1.17110768738347 |
| EUROC / EURCV 0.05% | uniswap_v3 | 0x6427...63c0 | 1.16903694300558 |
| RLUSD / EUROC | curve | 0x38b6...a11b | 1.15516505089275 |
| EUROC / EURCV 0.05% | uniswap-v4-ethereum | 0x0512...33bb | 1.16647451836546 |
| EUROC / USDC | uniswap_v2 | 0xcadb...25f2 | 1.17101572462514 |
| EUROC / ZIK 1% | uniswap-v4-ethereum | 0x3584...15df | 1.16802759777952 |
| EUROC / USDT 0.05% | uniswap_v3 | 0x57ba...26a8 | 1.15942031209055 |
| EUROC / HEX 0.3% | uniswap-v4-ethereum | 0x4a95...b125 | 1.17377176880491 |
| XEEUR / EUROC 0.01% | uniswap-v4-ethereum | 0x1c30...9499 | 1.1565437733 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.