| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| sDAI / USDM | curve | 0x425b...5802 | 1.00129821948240351209434445998936141802434301808146074273043618 |
| USD3 / USDM | curve | 0x8999...14ef | 0.88606721134947827454108248155321535988761189227833081723429206 |
| USDM / 3Crv | curve | 0xc83b...4f9e | 0.997060685 |
| USDM / crvUSD | curve | 0x30ce...c7a8 | 0.9858341291 |
| USDM / crvUSD | curve | 0x2dab...828a | 0.9681580687 |
| USDM / USDC | dodo-pmm-ethereum | 0xe253...a391 | 0.8443854479 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.