| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| YUSD / USDC 0.01% | uniswap-v4-ethereum | 0xda4a...ddab | 0.998288969207827 |
| YUSD / USDT 0.01% | uniswap_v3 | 0xdfce...6c0d | 0.99557295859188 |
| YUSD / USDT | curve | 0xcf90...51a8 | 0.999160377020098 |
| YUSD / frxUSD | curve | 0x2cc5...6396 | 0.993546941894849 |
| YUSD / USDT 0.01% | uniswap-v4-ethereum | 0xa9ee...6e12 | 1.0016099256692 |
| YUSD / WETH 0.05% | uniswap_v3 | 0x0db5...4953 | 1.00199295949541 |
| YUSD / USDC | curve | 0x9804...6861 | 0.989383019335089 |
| YUSD / USDT 0.05% | uniswap-v4-ethereum | 0x8673...3561 | 1.00119206068704 |
| YUSD / WBTC 0.05% | uniswap-v4-ethereum | 0x1c31...2392 | 1.1265907217 |
| YUSD / LINK 0.05% | uniswap-v4-ethereum | 0x2309...883d | 1.1018366139 |
| YUSD / sYUSD | curve | 0xb1a3...1fb3 | 1.0034316326819298053975989512788567776319721517120554716325801496 |
| YUSD / WETH 0.01% | uniswap_v3 | 0xb768...5fa2 | 1.0336796083 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.