| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| USD0++ / USD0 0.01% | uniswap_v3 | 0xabfc...ecda | 0.9674759326 |
| USD0++ / USD0 | curve | 0x1d08...ec52 | 0.9526785664 |
| USD0++ / USD0 | bunni-ethereum | 0x54ff...608b | 0.9278587921 |
| USD0++ / USDT 0.15% | uniswap-v4-ethereum | 0xf782...e49c | 0.9388522419 |
| rt-bUSD0 / USD0++ 0.01% | uniswap-v4-ethereum | 0x9d3b...1572 | 0.6013773723 |
| USD0++ / USD0 0.01% | uniswap-v4-ethereum | 0x87da...a069 | 0.9664055558 |
| USD0++ / USD0 0.1% | uniswap-v4-ethereum | 0x3ba2...609a | 0.9236961713 |
| USD0++ / USDC 0.01% | uniswap-v4-ethereum | 0x677a...de89 | 0.9548352731 |
| USD0++ / USDT 0.14% | uniswap-v4-ethereum | 0xfcc6...03e3 | 0.9332809148 |
| USD0++ / USDT 0.3% | uniswap_v3 | 0x00cc...a706 | 0.9384043233 |
| USD0++ / USDT 0.05% | uniswap-v4-ethereum | 0xbe83...e354 | 0.9407611642 |
| USD0++ / USDC 92.11% | uniswap-v4-ethereum | 0xfb1e...83e9 | 0.2998747338 |
| USD0++ / USDC 93.11% | uniswap-v4-ethereum | 0x5bc7...ae22 | 0.3783034433 |
| USD0++ / USDC 0.05% | uniswap_v3 | 0x34f3...64ab | 0.9304986149 |
| PT-USD0++@16/3/2025 / USD0++ | curve | 0x0b6b...3dac | 0.9438296855 |
| USD0++ / USDT 0.15% | uniswap-v4-ethereum | 0x6c2e...fdc3 | 0.9277749641 |
| USD0++ / sUSDS 0.05% | uniswap_v3 | 0x8e01...3623 | 0.915546064 |
| USD0++ / USD0 0.05% | uniswap_v3 | 0x3ead...59cb | 0.5973566114 |
| USD0++ / USDT 0.05% | uniswap_v3 | 0xb2fe...4167 | 0.9968426015 |
| USD0++ / USDC 92.11% | uniswap-v4-ethereum | 0xf8b6...1665 | 0.2210498345 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.