Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
eUSD / USDC | curve | 0x08bf...4147 | 1.00204685863589 |
ETH+ / eUSD / RSR | curve | 0xdb69...44b4 | 0.997582996152243 |
eUSD / crvFRAX | curve | 0xaeda...4d4f | 1.01240889418565 |
rgUSD / eUSD / USDC | curve | 0xdf90...0a99 | 0.9981273212 |
eUSD / fxUSD | curve | 0x16b5...e770 | 0.998003809945384 |
hyUSD / eUSD | curve | 0x8a84...65cd | 0.9964280677 |
USD3 / eUSD | curve | 0x7958...3822 | 1.0017882243 |
eUSD / USDC 0.01% | uniswap_v3 | 0xa32d...02b7 | 0.998022988079049 |
eUSD / mkUSD | curve | 0xc37c...f56f | 0.9984530685 |
eUSD / crvUSD | curve | 0x9128...7fae | 0.999712121686226 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.