| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| USDC / USDT 0.001% | uniswap-v4-ethereum | 0x8aa4...4e47 | 1.00325905810128 |
| USDC / USDT | uniswap-v4-ethereum | 0x395f...13a5 | 0.997176375486949 |
| USDC / USDT | fluid-ethereum | 0x6677...9f9b | 1.00208134580163 |
| WETH / USDT 0.3% | uniswap_v3 | 0x4e68...fa36 | 0.996927419882271 |
| sUSDe / USDT | fluid-ethereum | 0x1dd1...fa9b | 1.00211257379565 |
| USDe / USDT | fluid-ethereum | 0xf063...5d4a | 1.00186274984347 |
| DAI / USDC / USDT | curve | 0xbebc...f1c7 | 0.988884160655201 |
| crvUSD / USDT | curve | 0x390f...7bf4 | 0.987427792729883 |
| WETH / USDT 0.05% | uniswap_v3 | 0x11b8...97f6 | 1.00030884095193 |
| WETH / USDT 0.01% | uniswap_v3 | 0xc7bb...0e9b | 1.00034089211229 |
| WBTC / USDT 0.05% | uniswap_v3 | 0x5653...83b2 | 0.996962400355312 |
| USDe / USDT 0.005% | uniswap-v4-ethereum | 0x63bb...d1e7 | 1.00318700069305 |
| WBTC / USDT 0.3% | uniswap_v3 | 0x9db9...425b | 0.996838154838901 |
| sUSDS / USDT | curve | 0x0083...fd10 | 0.987427792729883 |
| USDC / USDT 0.01% | uniswap_v3 | 0x3416...27c6 | 1.00297173579528 |
| ETH / USDT 0.05% | uniswap-v4-ethereum | 0x7233...ca73 | 1.00052974950974 |
| USDC / USDT | fluid-ethereum | 0xea73...15c0 | 1.00186274984347 |
| USDC / USDT 0.01% | pancakeswap-v3-ethereum | 0x04c8...2d8f | 0.996766747916486 |
| USDC / USDT 0.001% | maverick-v2-eth | 0x3137...2dca | 1.00289539860136 |
| USDC / USDT | curve | 0x4f49...3c85 | 0.987427792729883 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.