| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| USDC / mUSD | uniswap-v4-ethereum | 0x72da...f169 | 0.999944360327902 |
| mUSD / ETH 48% | uniswap-v4-ethereum | 0xebc8...c119 | 0.8628153521 |
| USDC / mUSD 1% | uniswap-v4-ethereum | 0xd4d3...20cb | 0.997267621507197 |
| mUSD / WETH | pancakeswap_ethereum | 0x44ee...7879 | 1.0739303358 |
| mUSD / USDT 46.115% | uniswap-v4-ethereum | 0xa3c1...ea69 | 2.3481852873 |
| MINU / mUSD 1% | uniswap_v3 | 0xffb4...fb96 | 0.9973950866 |
| mUSD / ETH 50% | uniswap-v4-ethereum | 0x8dda...fe68 | 0.8374084383 |
| USDC / mUSD 9.99% | uniswap-v4-ethereum | 0x9b06...b773 | 1.0791911116 |
| mUSD / USDT 45.55% | uniswap-v4-ethereum | 0xab7b...c123 | 0.687259537 |
| USDC / mUSD 87% | uniswap-v4-ethereum | 0x5d13...4d75 | 0.674268674 |
| mUSD / ETH 96% | uniswap-v4-ethereum | 0xf9a5...65f0 | 3.4798031969 |
| mUSD / ZIK 1% | uniswap-v4-ethereum | 0xc30a...e358 | 1.0004921729 |
| mUSD / USDT 47% | uniswap-v4-ethereum | 0xd221...8b15 | 1.4731252191 |
| mUSD / USDT 46% | uniswap-v4-ethereum | 0x056e...c00f | 0.3605114506 |
| mUSD / awo 0.3% | uniswap-v4-ethereum | 0x0196...47a4 | 1.0003104743 |
| mUSD / USDT 88% | uniswap-v4-ethereum | 0xdaa6...ebe1 | 8.7520418925 |
| mUSD / ETH 92% | uniswap-v4-ethereum | 0x23a6...1a54 | 0.5655152824 |
| MANI / mUSD 0.3% | uniswap-v4-ethereum | 0xe063...bfd4 | 0.999374283 |
| mUSD / USDT 46.5% | uniswap-v4-ethereum | 0x2540...e482 | 0.4758876471 |
| mUSD / USDT 89% | uniswap-v4-ethereum | 0x523b...8ec1 | 1.5334813475 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.