Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
bLUSD / MAC 0.01% | uniswap_v3 | 0xf16b...f3e6 | 1.1788001698 |
LUSD / bLUSD 0.05% | blueprint | 0x218b...4d02 | 1.20492292893998 |
bLUSD / USDC 0.3% | uniswap_v3 | 0x58d6...b148 | 1.2911790581 |
LUSD / bLUSD 0.3% | uniswap_v3 | 0x3e48...3682 | 1.68339708744204 |
LUSD / bLUSD | solidlydex | 0x52aa...78ca | 1.1877865553754496783851284069197735220525043 |
bLUSD / WETH 1% | uniswap_v3 | 0x2d63...a322 | 1825.277589802215 |
bLUSD / MAC 1% | uniswap_v3 | 0x569e...123f | 1.18185074216951427175185143360506959193388934 |
bLUSD / LUSD3CRV-f | curve | 0x74ed...901c | 1.2816823114 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.