| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| RESOLV / USR 0.3% | uniswap_v3 | 0x3e38...963f | 0.990594403607189 |
| USR / USDC 0.01% | uniswap_v3 | 0x38c0...1188 | 1.00209481754127 |
| USR / USDC | curve | 0x3ee8...4195 | 0.992322484697412 |
| DOLA / USR | curve | 0x38de...f76e | 0.984656802486788 |
| GHO / USR | curve | 0x4628...cc52 | 0.981780614079922 |
| USR / USDC 0.05% | uniswap_v3 | 0x8bb9...e47c | 0.99841883285353 |
| USR / RLP | curve | 0xc907...2656 | 0.987907064499221 |
| USR / USDC | fluid-ethereum | 0xc6fd...ccc9 | 1.00063153722564 |
| RESOLV / USR 0.01% | uniswap_v3 | 0xb345...2428 | 0.990813483868791 |
| RLP / USR 0.05% | uniswap_v3 | 0x02a3...ea96 | 1.00044490318724 |
| USR / USDT 0.01% | uniswap_v3 | 0x0de6...f267 | 0.996303291763329 |
| USR / USDC | bunni-ethereum | 0x77f7...e615 | 0.9992983305 |
| USR / USDC 0.01% | uniswap-v4-ethereum | 0x3001...9884 | 1.00056441543775 |
| USR / USDC 0.005% | uniswap-v4-ethereum | 0xed66...7432 | 0.9996865689 |
| USR / GYD 0.02% | balancer_ethereum | 0x8461...557b | 0.998917387074269 |
| RESOLV / USR 1% | uniswap-v4-ethereum | 0x6517...8f06 | 1.0008885093 |
| USR / stRESOLV 29.1% | uniswap-v4-ethereum | 0xabbb...a449 | 0.9990375121 |
| USR / USDC 0.02% | uniswap-v4-ethereum | 0xd31c...f926 | 1.0002671244 |
| USR / ETH 88% | uniswap-v4-ethereum | 0x78e4...3b04 | 0.08135869927 |
| USR / stRESOLV 19.1% | uniswap-v4-ethereum | 0x5c36...9e0d | 1.0016843807 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.