Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
LUSD / 3Crv | curve | 0xed27...f0ca | 1.0327894182377 |
GUSD / 3Crv | curve | 0x4f06...7956 | 1.03311557982766 |
3Crv / MIM | curve | 0x5a6a...f41b | 1.03332079054762 |
alUSD / 3Crv | curve | 0x43b4...3f8c | 1.03667095475901 |
3Crv / FEI | curve | 0x06cb...1655 | 1.04353804400964 |
3Crv / FRAX | curve | 0xd632...ed3b | 1.03481466430458 |
BUSD / 3Crv | curve | 0x4807...085a | 1.03215451840247 |
mUSD / 3Crv | curve | 0x8474...c9f6 | 1.0433902508896618615926794938886517505487676473264816885158889213 |
3Crv / TUSD | curve | 0xecd5...89f1 | 1.03376268510575 |
USDK / 3Crv | curve | 0x3e01...f0fb | 1.040144244579650890993316039193318835261715823022143351649395562 |
RAI / 3Crv | curve | 0x6187...2c7d | 1.03795920308835 |
USDN / 3Crv | curve | 0x0f9c...83e1 | 1.0587862138784157433667083646512159657468525523125734856230604608 |
USDI / 3Crv | curve | 0x6359...f916 | 1.05183967891375 |
USX / 3Crv | curve | 0x7626...7819 | 1.03274053777273 |
DOLA / 3Crv | curve | 0xaa5a...927d | 1.0479491644643 |
RSV / 3Crv | curve | 0xc18c...44da | 1.04786881869459 |
3Crv / UST | curve | 0x890f...985f | 1.0449145699197959055380402042624547112850314621970660396776997115 |
PWRD / 3Crv | curve | 0xbcb9...4105 | 1.0172183845 |
OUSD / 3Crv | curve | 0x8765...910d | 1.03568312335904 |
USDM / 3Crv | curve | 0x5b3b...29f1 | 1.03801806066132 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.