| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| USDe / USDT 0.005% | uniswap-v4-ethereum | 0x63bb...d1e7 | 0.9989855025 |
| USDe / USDT | fluid-ethereum | 0xf063...5d4a | 0.9981247198 |
| USDe / FRAX | curve | 0x5dc1...0743 | 1.002249811 |
| USDe / USDC 0.01% | uniswap_v3 | 0xe6d7...e76a | 0.9992893158 |
| USDe / USDT 0.001% | uniswap-v4-ethereum | 0xce93...f4fb | 1.0020880282 |
| USDe / USDtb | fluid-ethereum | 0xb096...a364 | 1.0009248369 |
| USDe / USDT 0.003% | uniswap-v4-ethereum | 0x87b2...1641 | 0.997058962 |
| MNT / USDe 0.3% | uniswap_v3 | 0x9aac...e1a8 | 0.99631201404985 |
| USDe / USDC | curve | 0x0295...4d72 | 0.9912258279 |
| USDe / frxUSD 0.01% | uniswap-v4-ethereum | 0x2552...1847 | 0.9961267642 |
| USDe / USDT 0.002% | maverick-v2-eth | 0xe05a...2fc8 | 0.9965443901 |
| USDe / crvUSD | curve | 0xf55b...0442 | 1.0018642535 |
| USDe / USDC 0.005% | ekubo-v3-ethereum | 0x0000...70ba | 0.9985034053 |
| USDT / USDe | curve | 0x5b03...8e96 | 0.990789165026113 |
| USDe / DAI | curve | 0xf36a...c67d | 0.992341001 |
| USDe / USDT 0.006% | uniswap-v4-ethereum | 0xaae9...9b3b | 1.0016420105 |
| OUSD / USDe | curve | 0xdbdc...1a89 | 0.99890723302549784121342047534449984097753929138986355152470878 |
| GHO / USDe | curve | 0x670a...3a61 | 0.9964483349080870727955332686379690321041199726405275049598868664 |
| iUSD / USDe | fluid-ethereum | 0xc6ca...a819 | 1.00026179507016 |
| USDe / USDT 0.01% | uniswap_v3 | 0x4356...1e47 | 0.9961651541 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.