Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
BOLD / USDC | curve | 0xefc6...4b3e | 0.996335816773635 |
BOLD / waEthUSDC 0.01% | balancer-v3-ethereum | 0x698a...c469 | 0.994348932629226 |
BOLD / USDC 0.05% | uniswap_v3 | 0x1e4d...740e | 0.998314868150697 |
USDFI / BOLD | curve | 0x7913...fb71 | 0.990087110596064 |
fxUSD / USDC / USDaf / BOLD | curve | 0x8b87...c12f | 0.995242363037425 |
BOLD / LUSD | curve | 0x7ed1...f12b | 0.987077123452246 |
BOLD / WUSDN 0.04% | balancer-v3-ethereum | 0x3e6c...e566 | 1.0360482328 |
BOLD / USDS 0.05% | uniswap-v4-ethereum | 0x4bd8...c4e5 | 0.953335958532358 |
BOLD / RPL 1% | uniswap-v4-ethereum | 0xd4d7...87a5 | 0.939344519328236 |
BOLD / USDC 0.05% | uniswap-v4-ethereum | 0x5d0e...f893 | 0.998054103 |
frxUSD / BOLD / USDaf | curve | 0xb3fc...0b89 | 0.9704550506 |
BOLD / RPL 0.01% | uniswap-v4-ethereum | 0x06a1...b320 | 0.9705567086 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.