| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| USD0++ / USD0 | curve | 0x1d08...ec52 | 0.944846403183323 |
| USD0++ / USD0 0.01% | uniswap_v3 | 0xabfc...ecda | 0.973136827362375 |
| USD0++ / USD0 0.01% | uniswap-v4-ethereum | 0x87da...a069 | 0.946807513649151 |
| USD0++ / USDT 0.15% | uniswap-v4-ethereum | 0xf782...e49c | 0.935220970705945 |
| USD0++ / USD0 | bunni-ethereum | 0x54ff...608b | 0.9278587921 |
| USD0++ / USDT 0.3% | uniswap_v3 | 0x00cc...a706 | 0.943816074412973 |
| USD0++ / USD0 0.1% | uniswap-v4-ethereum | 0x3ba2...609a | 0.9236961713 |
| USD0++ / USDC 0.01% | uniswap-v4-ethereum | 0x677a...de89 | 0.9548352731 |
| USD0++ / USDT 0.14% | uniswap-v4-ethereum | 0xfcc6...03e3 | 0.9332809148 |
| USD0++ / USDT 0.05% | uniswap-v4-ethereum | 0xbe83...e354 | 0.9407611642 |
| USD0++ / USDC 0.05% | uniswap_v3 | 0x34f3...64ab | 0.9304986149 |
| PT-USD0++@16/3/2025 / USD0++ | curve | 0x0b6b...3dac | 0.9438296855 |
| USD0++ / USDT 0.15% | uniswap-v4-ethereum | 0x6c2e...fdc3 | 0.9277749641 |
| USD0++ / sUSDS 0.05% | uniswap_v3 | 0x8e01...3623 | 0.915546064 |
| USD0++ / USD0 0.05% | uniswap_v3 | 0x3ead...59cb | 1.02673910008638 |
| USD0++ / USDT 0.05% | uniswap_v3 | 0xb2fe...4167 | 0.9968426015 |
| USD0++ / USDC 0.3% | uniswap_v3 | 0x2570...89e4 | 0.9259694255 |
| USD0++ / WETH 0.3% | uniswap_v3 | 0xb5c2...3940 | 1.0365384901 |
| USD0++ / USDT 0.01% | uniswap_v3 | 0xabce...e6da | 0.9972081216 |
| USD0++ / USD0 | uniswap_v2 | 0xf354...a57f | 0.9055107531 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.