Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
mkUSD / USDe | curve | 0x1ab3...a5ad | 0.99822256823948 |
mkUSD / PRISMA | curve | 0x9d81...a2d3 | 0.997716045097192 |
mkUSD / crvUSD | curve | 0x3de2...b935 | 0.991467607271627 |
mkUSD / WETH | curve | 0xc895...b270 | 0.995212367819339 |
mkUSD / crvFRAX | curve | 0x0cfe...aee5 | 1.00676223184149 |
mkUSD / USDC | curve | 0xf980...fcdc | 1.00028768046605 |
mkUSD / fxUSD | curve | 0xca55...b5f1 | 0.9939225105 |
PYUSDUSDC / mkUSD | curve | 0x9e10...c64a | 1.0121937433 |
pxETH / mkUSD | curve | 0x71db...2be0 | 0.9534622114 |
ULTRA / mkUSD | curve | 0xc236...5de3 | 1.000036701 |
eUSD / mkUSD | curve | 0xc37c...f56f | 1.0078761858 |
mkUSD / PRISMA | uniswap_v2 | 0xfabd...2c20 | 1.0057761588577 |
mkUSD / PRISMA 0.3% | balancer_ethereum | 0x6055...254d | 0.989537181249842 |
mkUSD / YFI | curve | 0x5756...c457 | 1.0104450585 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.