| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| USD0 / USDC | fluid-ethereum | 0x3381...002e | 0.989427190338264 |
| USD0++ / USD0 | curve | 0x1d08...ec52 | 0.988195578188627 |
| USD0 / USDC 0.01% | uniswap_v3 | 0x4e66...add2 | 0.997093883463617 |
| USD0++ / USD0 0.01% | uniswap_v3 | 0xabfc...ecda | 0.998867106549596 |
| USD0 / USDC | curve | 0x1410...569f | 0.987669062356995 |
| USD0++ / USD0 0.01% | uniswap-v4-ethereum | 0x87da...a069 | 0.99799131492035 |
| USD0 / USDC 0.01% | uniswap-v4-ethereum | 0x1cca...4d16 | 0.998083970609436 |
| USD0 / USDT 0.05% | pancakeswap-v3-ethereum | 0xbfab...20b7 | 1.00209902278835 |
| USD0 / wM | curve | 0xcf31...2e6c | 0.99340229854976 |
| crvUSD / USD0 | curve | 0xe1c7...5f14 | 0.990406486524676 |
| USD0++ / USD0 | bunni-ethereum | 0x54ff...608b | 1.0011709349 |
| USD0 / sUSDS 0.05% | uniswap_v3 | 0xb4f2...3d68 | 0.9988634902 |
| USD0 / sUSDS 0.01% | uniswap_v3 | 0xedaa...db5c | 0.9986498402 |
| USD0 / USDT 0.3% | uniswap_v3 | 0xda09...6385 | 0.9904792655 |
| USD0++ / USD0 0.1% | uniswap-v4-ethereum | 0x3ba2...609a | 0.9970351299 |
| USD0 / USDC | bunni-ethereum | 0xc283...ab1b | 0.998127023 |
| USD0 / USDT 0.01% | uniswap_v3 | 0x6838...8a6a | 0.9943986023 |
| USD0 / GHO 0.01% | balancer_ethereum | 0x9ed2...3ab2 | 0.997872384 |
| USD0 / fxUSD | curve | 0x74c2...193f | 0.9875606741 |
| USD0++ / USD0 0.05% | uniswap_v3 | 0x3ead...59cb | 1.07628131608658 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.