| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| LUSD / 3Crv | curve | 0xed27...f0ca | 0.996032456731379 |
| BOLD / LUSD | curve | 0x7ed1...f12b | 0.996032456731379 |
| LUSD / DAI 0.05% | uniswap_v3 | 0x1698...2ec9 | 1.00011022637635 |
| LUSD / USDC 0.05% | uniswap_v3 | 0x4e09...f736 | 0.999216513736935 |
| LUSD / WETH | uniswap_v2 | 0xf20e...f469 | 1.00453354820627 |
| LUSD / WETH | solidlydex | 0x6d78...0974 | 1.00145591280761 |
| LUSD / OHM | sushiswap | 0xfdf1...aa6b | 1.00001706717693 |
| LUSD / USDC 0.03% | maverick-v2-eth | 0x61db...e72c | 1.00391071659285 |
| LUSD / WETH 0.3% | uniswap_v3 | 0x9663...0454 | 0.994075090603569 |
| LUSD / crvFRAX | curve | 0x497c...fd25 | 0.993051016701572 |
| LUSD / WETH | sushiswap | 0x279c...f41b | 1.00527050963618 |
| LUSD / crvUSD | curve | 0x9978...d55c | 0.987964988634621 |
| LUSD / LQTY 0.3% | uniswap_v3 | 0xd251...1289 | 0.999230296967068 |
| LUSD / BaoUSD / B-baoUSD-LUSD-BPT 0.04% | balancer_ethereum | 0x7e9a...8b1f | 0.999281470873466 |
| LUSD / LQTY / WETH 0.3% | balancer_ethereum | 0x5512...4a50 | 0.999671022860581 |
| LUSD / ORKHON | uniswap_v2 | 0x3cda...6ea8 | 1.00206197747863 |
| LUSD / sOHM | sushiswap | 0x2006...320a | 1.00302910067584 |
| UUSD / LUSD | curve | 0xcc68...384f | 0.991237820248253 |
| LUSD / TRUST 1% | uniswap_v3 | 0xe30b...bf8a | 1.0082415905 |
| LUSD / WETH | antfarm-ethereum | 0xf005...88ad | 0.8988507744 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.