| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| PYUSD / USDS | curve | 0xa632...fc1f | 0.994284110397358 |
| PYUSD / USDC | curve | 0x383e...8559 | 0.993623589880048 |
| PYUSD / crvUSD | curve | 0x625e...6200 | 0.994005799900517 |
| PYUSD / USDC 0.01% | uniswap_v3 | 0x1339...a5ce | 1.00255973938504 |
| PYUSD / USDT 0.01% | uniswap_v3 | 0xc30c...d04b | 1.00362046770784 |
| PYUSD / FRAX | curve | 0xa558...1dcb | 1.00080227510789 |
| PYUSD / WETH 1% | uniswap_v3 | 0x643e...76b1 | 0.995400851720417 |
| PYUSD / RLUSD 0.01% | uniswap-v4-ethereum | 0xbd46...df81 | 1.00255680769676 |
| PYUSD / WETH | uniswap_v2 | 0x4a4d...ba2e | 0.921883619261789 |
| PYUSD / USDT 0.3% | uniswap_v3 | 0xdd2e...357c | 0.998881472277126 |
| PYUSD / USDT 0.25% | maverick-v2-eth | 0x7066...a44a | 0.9978015218 |
| PYUSD / USDC 0.3% | uniswap_v3 | 0xd3f5...97b4 | 0.9935743526 |
| PYUSD / POLA 0.3% | uniswap_v3 | 0xeb85...7a54 | 1.0027486486 |
| WFLOW / PYUSD 0.3% | uniswap-v4-ethereum | 0x2ec7...b0e6 | 0.9974298796 |
| PYUSD / USDC 0.05% | uniswap_v3 | 0xaa4c...a757 | 0.998795579533078 |
| FAV XUSD / PYUSD 0.01% | uniswap-v4-ethereum | 0x4093...f7ef | 0.9851911566 |
| PYUSD / USDT 0.007% | uniswap-v4-ethereum | 0x67f2...08c8 | 0.9971843076 |
| PYUSD / USDT 0.04% | uniswap-v4-ethereum | 0xfa1d...1843 | 0.998361053 |
| crvUSD / PYUSD | curve | 0x8571...70b5 | 0.9944994238 |
| fxUSD / PYUSD | curve | 0xd698...f9b8 | 0.997332953431116 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.