Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
USDe / FRAX | curve | 0x5dc1...0743 | 1.0054206821511246017302365918924425675006111268175966825248035136 |
USDe / USDT 0.006% | uniswap-v4-ethereum | 0xaae9...9b3b | 0.998384479657061 |
USDe / USDC | curve | 0x0295...4d72 | 0.9996342628400650157418406084798232178677443061625857072847476275 |
USDe / USDC 0.01% | uniswap_v3 | 0xe6d7...e76a | 1.00038506499182 |
USDe / USDT 0.001% | uniswap-v4-ethereum | 0xce93...f4fb | 0.999208154245086 |
USDe / USDT 0.01% | uniswap_v3 | 0x4356...1e47 | 0.997552298797075 |
MNT / USDe 0.3% | uniswap_v3 | 0x9aac...e1a8 | 1.00012329663105 |
USDT / USDe | curve | 0x5b03...8e96 | 0.993637529287045 |
USDe / USDT 0.002% | uniswap-v4-ethereum | 0x16ca...a9e2 | 0.999872115648383 |
USDe / USDT 0.01% | uniswap-v4-ethereum | 0x2bcf...6333 | 1.00513647465016 |
GHO / USDe | curve | 0x670a...3a61 | 0.996234492606678 |
USDe / crvUSD | curve | 0xf55b...0442 | 0.986736366162194 |
USDe / USDT 0.003% | uniswap-v4-ethereum | 0x9ebc...f579 | 0.999035676614994 |
USDe / DAI | curve | 0xf36a...c67d | 0.989123749241276 |
frxUSD / USDe | curve | 0xdbb1...4580 | 0.996094782868047 |
USDe / USDT 0.01% | uniswap-v4-ethereum | 0xba23...7e16 | 1.00172002965543 |
USDe / USDC 0.01% | uniswap-v4-ethereum | 0x75dd...44c6 | 1.00023975546913 |
sUSD / USDe | curve | 0x59a0...f95d | 0.993296270161504 |
mkUSD / USDe | curve | 0x1ab3...a5ad | 0.996084305783603 |
USDe / FDUSD | curve | 0xf8db...71a4 | 0.995729323703143 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.