Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
USD0++ / USD0 | curve | 0x1d08...ec52 | 0.959937285583475 |
USD0++ / USDT 0.3% | uniswap_v3 | 0x00cc...a706 | 0.958946382021868 |
USD0++ / USDC 0.05% | uniswap_v3 | 0x34f3...64ab | 0.960294597090917 |
USD0++ / USD0 0.01% | uniswap_v3 | 0xabfc...ecda | 0.962665273393607 |
USD0++ / USDC 0.01% | uniswap-v4-ethereum | 0x677a...de89 | 0.9548352731 |
USD0++ / USDT 0.05% | uniswap_v3 | 0xb2fe...4167 | 0.93899262 |
USD0++ / USDT 0.05% | uniswap-v4-ethereum | 0xbe83...e354 | 0.9429918011 |
PT-USD0++@16/3/2025 / USD0++ | curve | 0x0b6b...3dac | 0.9438296855 |
USD0++ / USD0 0.05% | uniswap_v3 | 0x3ead...59cb | 0.965391809321546 |
USD0++ / sUSDS 0.05% | uniswap_v3 | 0x8e01...3623 | 0.915546064 |
USD0++ / USDC 0.3% | uniswap_v3 | 0x2570...89e4 | 0.9521127134 |
USD0++ / USDT 0.01% | uniswap_v3 | 0xabce...e6da | 0.9972081216 |
USD0++ / USD0 | uniswap_v2 | 0xf354...a57f | 0.9055107531 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.