Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
mkUSD / USDe | curve | 0x1ab3...a5ad | 0.962015315541351 |
mkUSD / PRISMA | uniswap_v2 | 0xfabd...2c20 | 0.989668246641458 |
mkUSD / crvFRAX | curve | 0x0cfe...aee5 | 0.962015315541351 |
mkUSD / PRISMA 0.3% | balancer_ethereum | 0x6055...254d | 0.966766888985755 |
mkUSD / PRISMA | curve | 0x9d81...a2d3 | 0.99743732853128 |
mkUSD / WETH | curve | 0xc895...b270 | 0.996646008402168 |
mkUSD / crvUSD | curve | 0x3de2...b935 | 0.99743732853128 |
mkUSD / fxUSD | curve | 0xca55...b5f1 | 0.9980822676 |
mkUSD / USDC | curve | 0xf980...fcdc | 0.9978473324 |
pxETH / mkUSD | curve | 0x71db...2be0 | 0.9534622114 |
PYUSDUSDC / mkUSD | curve | 0x9e10...c64a | 0.9824696249 |
ULTRA / mkUSD | curve | 0xc236...5de3 | 1.000036701 |
eUSD / mkUSD | curve | 0xc37c...f56f | 1.0048363319 |
mkUSD / YFI | curve | 0x5756...c457 | 1.0104450585 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.