Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
DOLA / USR | curve | 0x38de...f76e | 1.0060467504233143281414271818131494825954109934208532000589651573 |
GHO / USR | curve | 0x4628...cc52 | 0.999298138734733 |
USR / USDC | curve | 0x3ee8...4195 | 0.992366900463714 |
USR / RLP | curve | 0xc907...2656 | 1.00578165360277 |
RESOLV / USR 0.3% | uniswap_v3 | 0x3e38...963f | 1.00686960799262 |
USR / USDC 0.05% | uniswap_v3 | 0x8bb9...e47c | 1.00213211194101 |
USR / USDC 0.01% | uniswap-v4-ethereum | 0x3001...9884 | 0.999581013505048 |
USR / USDC 0.01% | uniswap_v3 | 0x38c0...1188 | 0.999006238033871 |
USR / GYD 0.02% | balancer_ethereum | 0x8461...557b | 1.00403292589984 |
yUSD / USR | curve | 0xd552...0144 | 1.0068115508 |
yUSD / USR | curve | 0x4e32...bb29 | 1.00324121474737 |
USR / USDC 0.02% | uniswap-v4-ethereum | 0xd31c...f926 | 1.0002671244 |
USR / USDC 0.3% | uniswap_v3 | 0x74f3...5883 | 0.9820526923 |
RLP / USR 0.05% | uniswap_v3 | 0x02a3...ea96 | 0.989197367989658 |
USR / USDC 0.005% | uniswap-v4-ethereum | 0xed66...7432 | 0.9996865689 |
RESOLV / USR 30% | uniswap-v4-ethereum | 0xb728...908f | 0.9993768145 |
USR / USDT 0.01% | uniswap_v3 | 0x0de6...f267 | 0.99680472746745 |
USR / USDT 0.3% | uniswap-v4-ethereum | 0xb3ed...a2b9 | 1.1466780737 |
RLP / USR 0.3% | uniswap-v4-ethereum | 0x85b1...a1c3 | 1.0001557412 |
USR / WETH 0.3% | uniswap_v3 | 0x05ac...8b36 | 0.996352345981203 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.