Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
YUSD / USDT 0.01% | uniswap-v4-ethereum | 0xa9ee...6e12 | 0.998754768669377 |
YUSD / USDC 0.01% | uniswap-v4-ethereum | 0xda4a...ddab | 0.999408324009806 |
YUSD / USDT 0.01% | uniswap_v3 | 0xdfce...6c0d | 0.998240653712359 |
YUSD / LINK 0.05% | uniswap-v4-ethereum | 0x2309...883d | 0.999591200771111 |
YUSD / WBTC 0.05% | uniswap-v4-ethereum | 0x1c31...2392 | 0.997995144595875 |
YUSD / USDC | curve | 0x9804...6861 | 0.993984639563004 |
YUSD / WETH 0.05% | uniswap_v3 | 0x0db5...4953 | 0.864665824 |
YUSD / USDT | curve | 0xcf90...51a8 | 1.00315410471593 |
YUSD / WETH 0.01% | uniswap_v3 | 0xb768...5fa2 | 0.8944670212 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.