Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
USDN / 3Crv | curve | 0x0f9c...83e1 | 0.0275801541075662 |
USDN / USDT | uniswap_v2 | 0x73fb...b353 | 0.02740114671 |
USDN / WETH | uniswap_v2 | 0x5535...7c09 | 0.0253827205166301 |
USDN / WETH | sushiswap | 0x3cf1...73cf | 0.024444091 |
USDN / POLK | uniswap_v2 | 0x5437...f376 | 0.03204631414 |
CRV / USDN | uniswap_v2 | 0xf10b...6499 | 0.0319713191531415 |
USDN / UNI | uniswap_v2 | 0x3fca...b49a | 0.0378809361141006 |
USDN / WBTC | uniswap_v2 | 0x4f65...5abf | 0.0388124746199816 |
NSBT / USDN | uniswap_v2 | 0x927f...a0b3 | 0.0410388306755789 |
USDN / WAVES | uniswap_v2 | 0xdbc5...9070 | 0.0268469169474152 |
USDN / HULK | uniswap_v2 | 0x7228...11ae | 0.0287360068216587581565856528876051223841957596727976949120951422550233070551113868453655121 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.