Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
ETH+ / eUSD / RSR | curve | 0xdb69...44b4 | 0.991797121303707 |
eUSD / USDC | curve | 0x08bf...4147 | 0.99207487707512 |
eUSD / fxUSD | curve | 0x16b5...e770 | 1.00246220591566 |
eUSD / crvFRAX | curve | 0xaeda...4d4f | 0.99312127393292 |
rgUSD / eUSD / USDC | curve | 0xdf90...0a99 | 0.999807718095186 |
hyUSD / eUSD | curve | 0x8a84...65cd | 0.9998931817 |
eUSD / USDC 0.01% | uniswap_v3 | 0xa32d...02b7 | 0.998022988079049 |
USD3 / eUSD | curve | 0x7958...3822 | 0.99936828039176 |
eUSD / mkUSD | curve | 0xc37c...f56f | 0.986470175974583 |
eUSD / crvUSD | curve | 0x9128...7fae | 0.999712121686226 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.