| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| eUSD / USDC | curve | 0x08bf...4147 | 0.995674582431181 |
| ETH+ / eUSD / RSR | curve | 0xdb69...44b4 | 0.995492641467362 |
| eUSD / crvFRAX | curve | 0xaeda...4d4f | 0.995492641467362 |
| eUSD / fxUSD | curve | 0x16b5...e770 | 0.992449165738869 |
| hyUSD / eUSD | curve | 0x8a84...65cd | 0.9904642093 |
| USDC / eUSD 88% | uniswap-v4-ethereum | 0x489e...28f0 | 0.1265207773 |
| USD3 / eUSD | curve | 0x7958...3822 | 0.988632267 |
| rgUSD / eUSD / USDC | curve | 0xdf90...0a99 | 0.9998077181 |
| eUSD / mkUSD | curve | 0xc37c...f56f | 0.986470176 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.