| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| USR / RLP | curve | 0xc907...2656 | 0.1330575489 |
| USR / USDC 0.05% | uniswap_v3 | 0x8bb9...e47c | 0.1229086742 |
| USR / ETH 2.7% | uniswap-v4-ethereum | 0xaf8b...f69c | 0.1228004183 |
| USR / USDT 2.8% | uniswap-v4-ethereum | 0x2553...e5ec | 0.1234503423 |
| GHO / USR | curve | 0x4628...cc52 | 0.13092253100011831784036597740959357756656877856390542242176938595 |
| USR / USDC | curve | 0x3ee8...4195 | 0.1200637976 |
| USR / USDC | bunni-ethereum | 0x77f7...e615 | 0.9992983305 |
| USR / USDC 0.01% | uniswap-v4-ethereum | 0x3001...9884 | 0.1327300195 |
| USR / USDT 2.911% | uniswap-v4-ethereum | 0xeb95...c2a3 | 0.4233468376 |
| USR / USDC 1.999% | uniswap-v4-ethereum | 0x73a6...1177 | 0.31388474 |
| USR / USDC 0.02% | uniswap-v4-ethereum | 0xd31c...f926 | 1.0004479429 |
| USR / USDC 1% | uniswap-v4-ethereum | 0xbcbe...7a66 | 0.2530968773 |
| USR / USDT 3% | uniswap-v4-ethereum | 0x84ac...38a8 | 0.3016840339 |
| USR / USDT 2.96% | uniswap-v4-ethereum | 0x0597...af0e | 0.6516882414 |
| USR / USDC | fluid-ethereum | 0xc6fd...ccc9 | 0.99792393 |
| USR / USDT 9.9% | uniswap-v4-ethereum | 0xaeb4...36ca | 0.8287187954 |
| USR / USDC 0.005% | uniswap-v4-ethereum | 0xed66...7432 | 0.9996865689 |
| USR / USDT 2.8% | uniswap-v4-ethereum | 0xe52c...5a79 | 0.5034198795 |
| USR / USDC 99.05% | uniswap-v4-ethereum | 0xb29a...ed9c | 0.04230557573 |
| USR / GYD 0.02% | balancer_ethereum | 0x8461...557b | 0.9981761605 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.