| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| USDS / WETH | uniswap_v2 | 0x6511...a42f | 0.04316197084 |
| USDS / USDT 0.05% | uniswap_v3 | 0x7297...3052 | 0.9949834357169802375407594478 |
| USDS / WETH 0.3% | uniswap_v3 | 0x171f...319a | 0.976528819002871 |
| USDS / USDC 0.05% | uniswap_v3 | 0xe749...7fa3 | 0.99810175118065758069314602465 |
| USDS / USDC 0.01% | uniswap_v3 | 0x88d6...2da3 | 1.00665054388821720268529445309 |
| USDS / USDS | radioshack_ethereum | 0x4444...b551 | 0.99895697739077304820388617303588773089783727633482112622200831918931586108248201191378803 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.