| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| BUSD / crvFRAX | curve | 0x8fdb...4190 | 0.9860458937 |
| BUSD / 3Crv | curve | 0x4807...085a | 0.8036970678 |
| BUSD / USDC 0.05% | uniswap_v3 | 0x00ce...d24c | 0.9924159892 |
| BUSD / USDC | uniswap_v2 | 0x5248...cf3c | 0.9903682123 |
| BUSD / WETH 1% | uniswap_v3 | 0x4ff7...d493 | 0.9824029527 |
| BUSD / WETH | uniswap_v2 | 0xc292...459a | 0.944230778 |
| BUSD / USDT | dodo-pmm-ethereum | 0x06ec...69ad | 0.9941704021 |
| BUSD / USDT 2.9% | uniswap-v4-ethereum | 0x71db...9e04 | 1.0021648619 |
| BUSD / USDT 2% | uniswap-v4-ethereum | 0x0ffe...ac6f | 0.9909312472 |
| BUSD / USDT 15% | uniswap-v4-ethereum | 0x6f8e...6bcb | 0.899651141 |
| BUSD / USDT | dodo-pmm-ethereum | 0xcd3d...5619 | 0.9655327764 |
| BUSD / USDT | dodo-pmm-ethereum | 0x8694...80d6 | 1.0000051741 |
| BUSD / USDC 1% | uniswap-v4-ethereum | 0xabcc...f449 | 0.9989355437 |
| BUSD / USDT 2% | uniswap-v4-ethereum | 0x5aca...21f2 | 0.9986402554 |
| BUSD / USDT 0.15% | uniswap-v4-ethereum | 0x61cd...41eb | 0.994452133 |
| BUSD / USDT 0.05% | uniswap_v3 | 0xd5ad...195d | 0.9951169898 |
| BUSD / USDT 0.01% | uniswap_v3 | 0xc66e...035d | 0.9957853077 |
| BUSD / USDT 1% | uniswap-v4-ethereum | 0xbe60...9801 | 1.0005727091 |
| BUSD / USDT 90% | uniswap-v4-ethereum | 0xf6e4...1188 | 10.0032771748 |
| BUSD / USDC 0.01% | uniswap_v3 | 0x5e35...15f4 | 1.0013305931 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.