| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| EURS / USDC | curve | 0x98a7...eb8b | 1.2398929714888 |
| EURS / sEUR | curve | 0x0ce6...7caa | 1.24581870899589 |
| EUROC / EURS / EURQ | curve | 0x48ed...63d4 | 1.21882291519995 |
| agEUR / EURT / EURS | curve | 0xb944...d571 | 1.16916042948551 |
| PAR / EURT / EURS / sEUR | curve | 0x3cfa...2243 | 1.23646447131164 |
| EURO / EURS | uniswap_v2 | 0xf3fb...a875 | 1.24200128118045 |
| EURS / USDC 0.05% | uniswap_v3 | 0xbd5f...97f5 | 2.695966319637277206212482752769342619189154358275171436745 |
| CM / EURS | uniswap_v2 | 0x8178...c40d | 1.2463736194 |
| EURS / USDC | uniswap_v2 | 0x7670...332f | 1.2561704625 |
| EURS / USDC | sushiswap | 0x41b3...fa58 | 1.2529502277 |
| EURS / WETH | uniswap_v2 | 0x7cc3...01e9 | 1.30595914580127 |
| EURS / crvFRAX | curve | 0x4cc9...927a | 1.1493509468 |
| AMS / EURS 0.3% | uniswap_v3 | 0xacb0...48e0 | 1.12223743579141 |
| EURS / USDC 0.3% | uniswap_v3 | 0x816f...2ea1 | 0.104197131719470706879747092769875983819121160862929906438756296758 |
| EURS / USDT | uniswap_v2 | 0x885e...e1b5 | 0.95922646769281135303799846338565685043760767096575040907826628074819421912827327197347598795952 |
| EURS / WETH 0.3% | uniswap_v3 | 0x277a...8ab1 | 0.009213980354939206151415693652866272320069290083 |
| EUROC / EURS 1% | uniswap_v3 | 0xa2e0...7cac | 1.09214823883252 |
| EURS / WETH | sushiswap | 0xece0...fdda | 0.0112023547370842 |
| EURS / [invalid] | uniswap_v2 | 0xa21f...cad4 | 1.02652181066315941044981225302381455429520893129370431380901419717126491344412021750703372180102093053286 |
| FLR / EURS | curve | 0xfc8c...0ff0 | 1.06623198305523 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.