Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
mkUSD / PRISMA | curve | 0x9d81...a2d3 | 1.02908870560692 |
mkUSD / USDe | curve | 0x1ab3...a5ad | 1.02908870560692 |
mkUSD / WETH | curve | 0xc895...b270 | 1.04650964598559 |
mkUSD / crvUSD | curve | 0x3de2...b935 | 1.03238556028766 |
mkUSD / crvFRAX | curve | 0x0cfe...aee5 | 1.03892831134557 |
ULTRA / mkUSD | curve | 0xc236...5de3 | 1.03623916892378 |
mkUSD / USDC | curve | 0xf980...fcdc | 1.06330043008872 |
mkUSD / fxUSD | curve | 0xca55...b5f1 | 1.04825431531636 |
PYUSDUSDC / mkUSD | curve | 0x9e10...c64a | 1.01819944157725 |
pxETH / mkUSD | curve | 0x71db...2be0 | 0.9534622114 |
eUSD / mkUSD | curve | 0xc37c...f56f | 1.0078761858 |
mkUSD / PRISMA | uniswap_v2 | 0xfabd...2c20 | 1.0057761588577 |
mkUSD / YFI | curve | 0x5756...c457 | 1.0104450585 |
mkUSD / PRISMA 0.3% | balancer_ethereum | 0x6055...254d | 0.989537181249842 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.