| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| STAK / sCBD | curve | 0xe4e9...697b | 0.8800594838 |
| STAK / scrvUSD | curve | 0x1847...0c28 | 1.0191883852 |
| YT-STAK(yn-RWA/USD)-2026/10/15 / STAK | curve | 0x9e4c...d1da | 0.7839414132 |
| STAK / YT-STAK(yn-RWA/USD)-2026/10/15 | curve | 0x740c...0b8b | 0.7887096697 |
| sCBD / CBD / scrvUSD / STAK | curve | 0x0e88...2cfb | 0.9782779097 |
| STAK / bscrvUSD | curve | 0xb66f...b63b | 0.8504735858 |
| STAK / sCBD | curve | 0xc030...1868 | 0.9430803164 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.