| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| RESOLV / USR 0.3% | uniswap_v3 | 0x3e38...963f | 0.997510779249137 |
| USR / USDC | curve | 0x3ee8...4195 | 0.9923809369 |
| GHO / USR | curve | 0x4628...cc52 | 0.990701271911676 |
| USR / USDC 0.01% | uniswap_v3 | 0x38c0...1188 | 1.0021306734 |
| USR / USDC 0.05% | uniswap_v3 | 0x8bb9...e47c | 1.0026148529 |
| USR / USDC | fluid-ethereum | 0xc6fd...ccc9 | 1.0001652823 |
| DOLA / USR | curve | 0x38de...f76e | 0.986616454065506 |
| RESOLV / USR 0.01% | uniswap_v3 | 0xb345...2428 | 1.00123291228408 |
| USR / USDT 0.01% | uniswap_v3 | 0x0de6...f267 | 0.9951228679 |
| USR / USDC | bunni-ethereum | 0x77f7...e615 | 0.9992983305 |
| USR / RLP | curve | 0xc907...2656 | 0.9950593019 |
| USR / USDC 0.01% | uniswap-v4-ethereum | 0x3001...9884 | 1.000261661 |
| USR / USDC 0.02% | uniswap-v4-ethereum | 0xd31c...f926 | 1.0004479429 |
| USR / USDC 0.005% | uniswap-v4-ethereum | 0xed66...7432 | 0.9996865689 |
| USR / GYD 0.02% | balancer_ethereum | 0x8461...557b | 0.9981761605 |
| RESOLV / USR 1% | uniswap-v4-ethereum | 0x6517...8f06 | 1.0008885093 |
| RLP / USR 0.05% | uniswap_v3 | 0x02a3...ea96 | 0.998404284091652 |
| USR / stRESOLV 29.1% | uniswap-v4-ethereum | 0xabbb...a449 | 0.9990375121 |
| USR / ETH 88% | uniswap-v4-ethereum | 0x78e4...3b04 | 0.05524137444 |
| USR / stRESOLV 19.1% | uniswap-v4-ethereum | 0x5c36...9e0d | 1.0016843807 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.