| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| USDe / USDT | fluid-ethereum | 0xf063...5d4a | 0.994672369246349 |
| USDe / USDT 0.005% | uniswap-v4-ethereum | 0x63bb...d1e7 | 1.00037117627505 |
| USDe / FRAX | curve | 0x5dc1...0743 | 0.993253008998347 |
| USDe / USDT 0.001% | uniswap-v4-ethereum | 0xce93...f4fb | 1.00033731870382 |
| USDe / USDC 0.01% | uniswap_v3 | 0xe6d7...e76a | 1.00114223173756 |
| USDe / USDtb | fluid-ethereum | 0xb096...a364 | 0.998234258725403 |
| USDT / USDe | curve | 0x5b03...8e96 | 0.988474677212906 |
| MNT / USDe 0.3% | uniswap_v3 | 0x9aac...e1a8 | 1.001657474254 |
| GHO / USDe | curve | 0x670a...3a61 | 0.992960477015815 |
| USDe / USDC | curve | 0x0295...4d72 | 0.993877825979025 |
| USDe / USDT 0.006% | uniswap-v4-ethereum | 0xaae9...9b3b | 1.00156671524005 |
| USDe / crvUSD | curve | 0xf55b...0442 | 0.993128743577254 |
| USDe / frxUSD 0.01% | uniswap-v4-ethereum | 0x2552...1847 | 0.99960046609596 |
| USDe / DAI | curve | 0xf36a...c67d | 0.993321778799219 |
| USDe / USDT 0.01% | uniswap_v3 | 0x4356...1e47 | 0.996807554121912 |
| USDe / jrUSDe | fluid-ethereum | 0x5058...705d | 0.995048679251531 |
| mkUSD / USDe | curve | 0x1ab3...a5ad | 0.992870666179033 |
| srUSDe / USDe 0.752% | uniswap-v4-ethereum | 0xd949...4b23 | 1.00115211124104 |
| USDe / jrUSDe 0.725% | uniswap-v4-ethereum | 0xd468...e2b2 | 0.993901950074603 |
| srUSDe / USDe | fluid-ethereum | 0x86df...dab1 | 1.00064105393761 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.