Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
eUSDe / USDC 1% | uniswap_v3 | 0xcce2...89aa | 0.981650997146878 |
eUSDe / USDC 11.33% | uniswap-v4-ethereum | 0xc707...5776 | 1.062351815 |
eUSDe / USDC 5% | uniswap-v4-ethereum | 0x6d99...3639 | 1.070843486 |
PT-eUSDe@30/5/2025 / eUSDe | curve | 0x6b90...48ba | 0.9977338497 |
eUSDe / USDT 10% | uniswap-v4-ethereum | 0x6082...66e5 | 1.1203987763 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.