| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| USD0 / USDC 0.01% | uniswap_v3 | 0x4e66...add2 | 0.997628779494972 |
| USD0++ / USD0 0.01% | uniswap_v3 | 0xabfc...ecda | 0.998463570034797 |
| USD0++ / USD0 | curve | 0x1d08...ec52 | 0.99334909121303 |
| USD0 / USDC | curve | 0x1410...569f | 0.991555073538038 |
| USD0 / USDC | fluid-ethereum | 0x3381...002e | 0.997935858676555 |
| USD0 / USDC 0.01% | uniswap-v4-ethereum | 0x1cca...4d16 | 0.997864624108502 |
| crvUSD / USD0 | curve | 0xe1c7...5f14 | 1.00165170235725 |
| USD0 / USDT 0.05% | pancakeswap-v3-ethereum | 0xbfab...20b7 | 0.994420017084594 |
| USD0++ / USD0 | bunni-ethereum | 0x54ff...608b | 1.0011709349 |
| USD0 / sUSDS 0.05% | uniswap_v3 | 0xb4f2...3d68 | 0.9988634902 |
| USD0 / sUSDS 0.01% | uniswap_v3 | 0xedaa...db5c | 0.9986498402 |
| USD0 / USDC | bunni-ethereum | 0xc283...ab1b | 0.998127023 |
| USD0 / USDC 0.007% | uniswap-v4-ethereum | 0xd948...b83e | 0.9972348271 |
| USD0++ / USD0 0.1% | uniswap-v4-ethereum | 0x3ba2...609a | 0.9970351299 |
| USD0++ / USD0 0.01% | uniswap-v4-ethereum | 0x87da...a069 | 0.999356202369294 |
| USD0 / USDT 0.01% | uniswap_v3 | 0x6838...8a6a | 0.9943986023 |
| USD0 / GHO 0.01% | balancer_ethereum | 0x9ed2...3ab2 | 0.997872384 |
| USD0 / fxUSD | curve | 0x74c2...193f | 0.9875606741 |
| GHO / USD0 0.01% | maverick-v2-eth | 0x44c5...58ad | 0.9974990942 |
| USD0++ / USD0 0.05% | uniswap_v3 | 0x3ead...59cb | 1.0010724343 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.