Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
VUSD / WETH | sushiswap | 0xb900...0a8e | 1.00022633148565 |
crvUSD / VUSD | curve | 0xb1c1...944f | 1.00124864559266 |
VUSD / USDC 0.3% | sushiswap-v3-ethereum | 0x33df...a4d0 | 0.997011328161593 |
VUSD / USDC | sushiswap | 0xbf97...44de | 0.996322635329186 |
VUSD / USDT 0.3% | sushiswap-v3-ethereum | 0xa6d4...64fa | 0.9893214341 |
VUSD / USDC 0.3% | uniswap-v4-ethereum | 0x02e0...973d | 0.9973675555 |
VUSD / USDC 0.05% | sushiswap-v3-ethereum | 0x2abb...71dc | 1.0012886955 |
VUSD / WETH 0.3% | uniswap_v3 | 0xf62b...ee76 | 1.0616399001 |
VUSD / WETH 0.3% | sushiswap-v3-ethereum | 0x4abf...15cb | 1.0742743335 |
VUSD / WETH 0.01% | sushiswap-v3-ethereum | 0xae1d...10ec | 0.9243247581 |
VUSD / USDC 0.3% | uniswap_v3 | 0xf642...fea3 | 0.9966120571 |
VUSD / DAI 0.3% | uniswap_v3 | 0xf47b...b19c | 1.01961778933977702897995871687 |
VUSD / 3Crv | curve | 0x4df9...b508 | 0.993663642818299 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.