Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
alUSD / crvFRAX | curve | 0xb30d...30a5 | 0.995792843964119 |
alUSD / WETH | sushiswap | 0x0589...281b | 0.98570557089233 |
sDOLA / alUSD | curve | 0x4606...d87f | 1.00384687566658 |
alUSD / 3Crv | curve | 0x43b4...3f8c | 0.973065051971557 |
alUSD / fxUSD | curve | 0x27cb...3c9d | 1.02194449272195 |
alUSD / FRAX / FEI | curve | 0xbaaa...dc89 | 0.989960767297069 |
alETH / alUSD 0.05% | uniswap_v3 | 0x0d1a...a2d2 | 1.01565053920619 |
alUSD / DAI 0.05% | uniswap_v3 | 0x7ceb...8f86 | 0.996440233758869 |
PYUSD / alUSD 0.05% | blueprint | 0xd86b...6af7 | 0.978520886928996 |
alUSD / FRAX 0.05% | uniswap_v3 | 0x173c...4420 | 0.9867789302 |
rgUSD / alUSD | curve | 0xf5a7...e977 | 0.974324570267931 |
alUSD / DAI | uniswap_v2 | 0xf892...17f8 | 591.912001406315 |
alETH / alUSD 0.3% | uniswap_v3 | 0x6899...1c61 | 0.897114966071808 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.