Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
thUSD / 3Crv | curve | 0x9155...de0b | 0.981508185220143 |
thUSD / crvUSD | curve | 0x9e64...68a2 | 0.981773793280792 |
tBTC / thUSD | curve | 0xb79b...2b7f | 0.9899801397 |
thUSD / DAI 0.3% | uniswap_v3 | 0xc8a0...7ad1 | 0.993935876822114 |
thUSD / 3Crv | curve | 0x212a...92be | 1.02018421990324 |
thUSD / crvUSD | curve | 0xdd9e...b220 | 1.02086706116321 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.