| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| aUSDC / ONDO | uniswap_v2 | 0xd4b4...d273 | 0.939850944805404 |
| aDAI / aUSDC / aUSDT | curve | 0xdebf...8eee | 0.9896688227 |
| USDC / aUSDC 50% | uniswap-v4-ethereum | 0xe337...2297 | 1.8244339041 |
| aUSDC / aDAI | curve | 0x6a27...1dca | 0.9993724627 |
| USDC / aUSDC 90% | uniswap-v4-ethereum | 0x0bda...d695 | 9.8833747432 |
| aUSDC / USDC 0.05% | uniswap_v3 | 0x4f51...ee18 | 0.9893500147 |
| aUSDC / DAI 0.05% | uniswap_v3 | 0x4017...e899 | 0.00000000000000010115743454244734272622924378937152348589 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.