| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| USDC / USDT | fluid-ethereum | 0x6677...9f9b | 1.0002678089541 |
| WETH / USDC 0.05% | uniswap_v3 | 0x88e6...5640 | 1.00152179822736 |
| USDC / USDT 0.001% | uniswap-v4-ethereum | 0x8aa4...4e47 | 1.00017731104261 |
| USDC / RLUSD | curve | 0xd001...a186 | 0.996419112403694 |
| USDC / USDT | fluid-ethereum | 0xea73...15c0 | 1.00005297157351 |
| DAI / USDC / USDT | curve | 0xbebc...f1c7 | 0.999557534933430531423125116038505779761397592854957137423778984 |
| crvUSD / USDC | curve | 0x4dec...d69e | 0.996227238017794 |
| WBTC / USDC 0.3% | uniswap_v3 | 0x99ac...bc35 | 1.00227489655119 |
| USDC / WETH 0.3% | uniswap_v3 | 0x8ad5...e6d8 | 1.00294779810148 |
| DAI / USDC 0.01% | uniswap_v3 | 0x5777...2168 | 1.00174341945382 |
| USDC / ETH | fluid-ethereum | 0x8369...34bf | 1.00032099003901 |
| ETH / USDC 0.3% | uniswap-v4-ethereum | 0xdce6...f78d | 1.0003809839201 |
| USDC / USDT 0.01% | uniswap_v3 | 0x3416...27c6 | 1.00258865523552 |
| USDC / WETH 0.01% | uniswap_v3 | 0xe055...939f | 1.00161439751342 |
| AUSD / USDC 0.01% | uniswap-v4-ethereum | 0x5720...6dee | 1.0000124397951 |
| USDC / USDT | uniswap-v4-ethereum | 0x395f...13a5 | 1.00017731104261 |
| ETH / USDC 0.05% | uniswap-v4-ethereum | 0x21c6...ca27 | 1.00039016543227 |
| USDC / WBTC / WETH | curve | 0x7f86...829b | 0.996309953235152 |
| EUROC / USDC 0.05% | uniswap_v3 | 0x95db...73d6 | 0.999684327188229 |
| PAXG / USDC 0.05% | uniswap_v3 | 0x5ae1...4082 | 1.00258865523552 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.