Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
reUSD / sfrxUSD | curve | 0xed78...a441 | 1.15650282702788 |
sfrxUSD / scrvUSD | curve | 0x15e4...5752 | 1.14460943037386 |
sfrxUSD / sUSDe | curve | 0x3bd1...d6e2 | 1.14438126411218 |
sfrxUSD / WETH | uniswap_v2 | 0x001d...5324 | 2612829738157.8 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.