| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| eUSD / USDC | curve | 0x08bf...4147 | 0.990814808205076 |
| ETH+ / eUSD / RSR | curve | 0xdb69...44b4 | 0.988919123648992 |
| eUSD / crvFRAX | curve | 0xaeda...4d4f | 0.989856111104341 |
| eUSD / fxUSD | curve | 0x16b5...e770 | 0.987359951465075 |
| hyUSD / eUSD | curve | 0x8a84...65cd | 0.990464209257328 |
| USD3 / eUSD | curve | 0x7958...3822 | 0.988632267 |
| rgUSD / eUSD / USDC | curve | 0xdf90...0a99 | 0.9998077181 |
| eUSD / mkUSD | curve | 0xc37c...f56f | 0.986470176 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.