| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| USDN / 3Crv | curve | 0x0f9c...83e1 | 0.0239658672729824 |
| USDN / WAVES | uniswap_v2 | 0xdbc5...9070 | 0.0282411670615896 |
| USDN / WETH | uniswap_v2 | 0x5535...7c09 | 0.02721366806 |
| USDN / WETH | sushiswap | 0x3cf1...73cf | 0.02731805163 |
| USDN / POLK | uniswap_v2 | 0x5437...f376 | 0.02469298156 |
| USDN / USDT | uniswap_v2 | 0x73fb...b353 | 0.02616392843 |
| NSBT / USDN | uniswap_v2 | 0x927f...a0b3 | 0.0410388306755789 |
| USDN / HULK | uniswap_v2 | 0x7228...11ae | 0.0287360068216587581565856528876051223841957596727976949120951422550233070551113868453655121 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.