| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| USDN / 3Crv | curve | 0x0f9c...83e1 | 0.0258590655 |
| USDN / WAVES | uniswap_v2 | 0xdbc5...9070 | 0.02855625538 |
| USDN / WETH | uniswap_v2 | 0x5535...7c09 | 0.02767240812 |
| USDN / WETH | sushiswap | 0x3cf1...73cf | 0.02804797096 |
| USDN / POLK | uniswap_v2 | 0x5437...f376 | 0.0233344417 |
| USDN / USDT | uniswap_v2 | 0x73fb...b353 | 0.04321745843 |
| USDN / UNI | uniswap_v2 | 0x3fca...b49a | 0.0378809361141006 |
| USDN / WBTC | uniswap_v2 | 0x4f65...5abf | 0.0388124746199816 |
| CRV / USDN | uniswap_v2 | 0xf10b...6499 | 0.02533842792 |
| USDN / HULK | uniswap_v2 | 0x7228...11ae | 0.0287360068216587581565856528876051223841957596727976949120951422550233070551113868453655121 |
| NSBT / USDN | uniswap_v2 | 0x927f...a0b3 | 0.0410388306755789 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.